Tagged articles
653 articles
Page 3 of 7
Open Source Tech Hub
Open Source Tech Hub
May 17, 2024 · Information Security

How to Secure WebSocket Connections with JWT Authentication

This guide explains the security challenges of WebSocket, outlines a step‑by‑step JWT authentication flow, and presents three practical token‑passing techniques—including URL parameters, post‑connection messages, and sub‑protocols—while emphasizing the use of wss:// and safe token storage.

AuthenticationJWTSecurity
0 likes · 5 min read
How to Secure WebSocket Connections with JWT Authentication
Java High-Performance Architecture
Java High-Performance Architecture
May 17, 2024 · Information Security

How MaxKey SSO Delivers Secure, Scalable Single Sign‑On for Enterprises

MaxKey is an enterprise‑grade single sign‑on solution that supports OAuth 2.x, OpenID Connect, SAML 2.0, JWT, CAS and SCIM, offering secure identity management, RBAC, multi‑tenant capabilities, robust password policies, brute‑force protection, session control, and BCrypt‑based password encryption.

AuthenticationIdentity ManagementJava
0 likes · 11 min read
How MaxKey SSO Delivers Secure, Scalable Single Sign‑On for Enterprises
Data Thinking Notes
Data Thinking Notes
May 16, 2024 · Information Security

How a Data Security Governance Platform Secures the Full Data Lifecycle

This article explains how a data security governance platform protects data across its entire lifecycle—from warehouse construction and collection to application—by implementing fine‑grained permission controls, encryption, masking, authentication, and comprehensive auditing, while addressing scalability, high availability, and regulatory compliance challenges.

AuthenticationAuthorizationBig Data
0 likes · 13 min read
How a Data Security Governance Platform Secures the Full Data Lifecycle
Open Source Linux
Open Source Linux
May 13, 2024 · Information Security

What Is a Bastion Host and Why It’s Critical for Secure Operations

This article explains what a bastion host (jump server) is, why it evolved from traditional jump servers, its core 4A design (authentication, authorization, account, audit), deployment options, common features, authentication methods, and how open‑source and commercial solutions differ, helping organizations improve security and compliance.

AuthenticationBastion HostOperations
0 likes · 10 min read
What Is a Bastion Host and Why It’s Critical for Secure Operations
php Courses
php Courses
May 9, 2024 · Backend Development

Implementing User Authentication and Authorization in PHP

This article explains how to implement user authentication and role‑based authorization in PHP, covering password hashing with password_hash/password_verify, database queries for credential verification, and conditional logic for granting access based on user roles, with sample code snippets illustrating each step.

AuthenticationAuthorizationBackend
0 likes · 4 min read
Implementing User Authentication and Authorization in PHP
Open Source Tech Hub
Open Source Tech Hub
May 7, 2024 · Information Security

JWT vs Session: Which Authentication Method Fits Your Web App?

This article explains what JWT and Session are, compares their storage, state management, security, performance, cross‑domain support, expiration, use cases, logout mechanisms, and one‑time use scenarios, and helps you decide which authentication approach best suits your application’s needs.

AuthenticationJWTSession
0 likes · 6 min read
JWT vs Session: Which Authentication Method Fits Your Web App?
Architect
Architect
May 4, 2024 · Information Security

How to Secure Third‑Party APIs with AK/SK, Tokens, and Signature Strategies

This article walks through a complete security design for third‑party APIs, covering API‑key generation, request signing with timestamps and nonces, token handling, permission granularity, database schema, and practical implementation details such as rate limiting, idempotency, and TLS encryption.

API SecurityAuthenticationBackend
0 likes · 34 min read
How to Secure Third‑Party APIs with AK/SK, Tokens, and Signature Strategies
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 2, 2024 · Information Security

Master Spring Security: From Basic Auth to Custom Login Pages

This article walks through Spring Security fundamentals, covering authentication mechanisms, authorization configuration, dependency setup, custom user details with database integration, and how to replace the default login page with a custom one, all illustrated with code snippets and screenshots.

AuthenticationAuthorizationSpring Boot
0 likes · 8 min read
Master Spring Security: From Basic Auth to Custom Login Pages
Architect
Architect
Apr 27, 2024 · Information Security

How to Stop Malicious API Calls: 8 Practical Defense Strategies

This article walks through eight concrete techniques—firewall rules, captchas, authentication checks, IP whitelists, HTTPS encryption, rate limiting, monitoring, and an API gateway—to prevent abusive requests from draining resources or compromising critical services.

API SecurityAuthenticationCaptcha
0 likes · 11 min read
How to Stop Malicious API Calls: 8 Practical Defense Strategies
21CTO
21CTO
Apr 23, 2024 · Information Security

Session vs Token Authentication: Which Is Right for Your Backend?

This article explains how session‑based and token‑based (JWT) authentication work in backend applications, compares their workflows, shows practical Express.js code examples, and helps you decide which method best fits your project's security and scalability needs.

AuthenticationBackendExpress
0 likes · 10 min read
Session vs Token Authentication: Which Is Right for Your Backend?
Alibaba Cloud Native
Alibaba Cloud Native
Apr 18, 2024 · Cloud Native

What’s New in RocketMQ ACL 2.0? A Deep Dive into Features, Architecture, and Configuration

This article explains the motivations behind RocketMQ ACL 2.0, outlines its six major enhancements—including fine‑grained API permissions, flexible matching modes, and cluster‑wide access control—details the RBAC/ABAC model, authentication and authorization workflows, configuration examples, command‑line usage, and migration strategies, and discusses future planning for the access control system.

ACLAuthenticationAuthorization
0 likes · 24 min read
What’s New in RocketMQ ACL 2.0? A Deep Dive into Features, Architecture, and Configuration
Top Architect
Top Architect
Apr 8, 2024 · Backend Development

Why Token Pass‑through Is Discouraged in Microservice Authentication and Alternative Design Patterns

The article explains the drawbacks of token pass‑through in microservice authentication, advocates explicit parameter passing, outlines unified gateway authentication with Feign or Dubbo, explores Kubernetes‑integrated deployment options, and concludes with a promotional invitation to a technical community.

AuthenticationBackendDubbo
0 likes · 9 min read
Why Token Pass‑through Is Discouraged in Microservice Authentication and Alternative Design Patterns
Goodme Frontend Team
Goodme Frontend Team
Mar 18, 2024 · Frontend Development

How to Implement Seamless, Secure Login in WeChat Mini‑Programs

This article explains why user authentication is essential for mobile mini‑programs, outlines security measures using AccessToken and RefreshToken, and provides step‑by‑step techniques—including automatic login, token refresh, request queuing, and user‑state handling—to achieve a frictionless user experience.

AuthenticationTokenWeChat
0 likes · 9 min read
How to Implement Seamless, Secure Login in WeChat Mini‑Programs
Alibaba Cloud Native
Alibaba Cloud Native
Mar 13, 2024 · Cloud Native

Why STS Login Slows Down SLS and How a New Ticket Scheme Fixes It

Alibaba Cloud Log Service’s traditional STS password‑less login suffers from slow load times, fixed session limits, cross‑origin cookie restrictions, and hard‑to‑debug flows, prompting SLS to introduce a new ticket‑based authentication that streamlines access, extends sessions, improves security, and enables one‑click dashboard sharing.

AuthenticationDashboard SharingSLS
0 likes · 9 min read
Why STS Login Slows Down SLS and How a New Ticket Scheme Fixes It
Java Tech Enthusiast
Java Tech Enthusiast
Mar 13, 2024 · Information Security

Understanding QR Code Login and Token-Based Authentication

QR‑code login lets a already‑authenticated mobile app scan a code shown on a PC, using a server‑issued token tied to the user’s account and device ID; the scan creates a temporary token, the user confirms, and a permanent token is issued to the PC, enabling password‑less, secure authentication.

AuthenticationBackendMobile
0 likes · 11 min read
Understanding QR Code Login and Token-Based Authentication
Architect Chen
Architect Chen
Mar 3, 2024 · Information Security

How CAS Single Sign-On Works: Mechanisms, Components, and Real‑World Use Cases

This article explains the Central Authentication Service (CAS) single sign‑on system, detailing its token‑based architecture, the roles of the CAS server, client, and protected services, and outlines typical scenarios such as e‑commerce, enterprise intranets, online platforms, and cloud services.

AuthenticationCASSSO
0 likes · 7 min read
How CAS Single Sign-On Works: Mechanisms, Components, and Real‑World Use Cases
Selected Java Interview Questions
Selected Java Interview Questions
Feb 29, 2024 · Information Security

How to Prevent Malicious API Abuse: Firewalls, Captchas, Authentication, IP Whitelists, Encryption, Rate Limiting, Monitoring, and Gateways

This article explains a comprehensive set of techniques—including firewalls, captchas, authentication checks, IP whitelists, data encryption, rate limiting, monitoring, and API gateways—to protect interfaces from malicious abuse and ensure secure, reliable service operation.

API SecurityAuthenticationCaptcha
0 likes · 12 min read
How to Prevent Malicious API Abuse: Firewalls, Captchas, Authentication, IP Whitelists, Encryption, Rate Limiting, Monitoring, and Gateways
Architect
Architect
Feb 19, 2024 · Information Security

Mastering Single Sign-On: From Session Basics to CAS Implementation

This article walks through the fundamentals of HTTP session handling, the challenges of session sharing in clustered environments, and presents a step‑by‑step design of a Single Sign‑On solution using CAS, including concrete code examples, Redis‑based session storage, and a comparison with OAuth2.

AuthenticationCASJava
0 likes · 17 min read
Mastering Single Sign-On: From Session Basics to CAS Implementation
Top Architect
Top Architect
Feb 18, 2024 · Backend Development

Why Token Pass‑Through Is Discouraged and Alternative Unified Authorization Designs for Microservices

The article explains why passing tokens between microservices is a poor design, proposes exposing explicit userId parameters, describes unified authentication via an API gateway with Feign, Dubbo or Spring Boot Web implementations, compares their pros and cons, and shows how to integrate these patterns with Kubernetes and internal API path rules.

AuthenticationBackendDubbo
0 likes · 9 min read
Why Token Pass‑Through Is Discouraged and Alternative Unified Authorization Designs for Microservices
Architect
Architect
Feb 10, 2024 · Backend Development

Why Token Pass‑Through Is Bad and How to Build Unified Auth in Microservices

The article critiques token pass‑through for microservice authentication, explains why internal APIs should stay stateless, and presents unified authorization patterns using Spring Cloud Gateway with Feign, Dubbo, or a gateway‑less design, plus Kubernetes integration and trade‑offs.

AuthenticationDubboKubernetes
0 likes · 9 min read
Why Token Pass‑Through Is Bad and How to Build Unified Auth in Microservices
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Feb 2, 2024 · Backend Development

Master Spring Security 5.7+ Config: From WebSecurityConfigurerAdapter to SecurityFilterChain

This guide explains how Spring Security configuration changed after version 5.7, covering the shift from WebSecurityConfigurerAdapter to SecurityFilterChain beans, multiple filter chain setup, in‑memory user definitions, custom authorization decisions, and shared authentication components, with full code examples.

AuthenticationAuthorizationJava
0 likes · 7 min read
Master Spring Security 5.7+ Config: From WebSecurityConfigurerAdapter to SecurityFilterChain
FunTester
FunTester
Jan 29, 2024 · Information Security

Fundamentals of API Security: Principles, Practices, and Lifecycle Management

This article provides a comprehensive overview of API security, covering authentication and authorization, privacy and encryption, input validation, detection, rate limiting, logging, secure coding, vulnerability management, lifecycle phases, and the importance of education and training to protect modern software ecosystems.

API SecurityAuthenticationAuthorization
0 likes · 14 min read
Fundamentals of API Security: Principles, Practices, and Lifecycle Management
php Courses
php Courses
Jan 23, 2024 · Information Security

Using JWT for Secure Authentication in PHP

This article explains how to install the PHP‑JWT library with Composer, generate JSON Web Tokens using JWT::encode, validate them with JWT::decode, and configure custom expiration and not‑before times to enhance authentication security in PHP applications.

AuthenticationJWTPHP
0 likes · 4 min read
Using JWT for Secure Authentication in PHP
Code Ape Tech Column
Code Ape Tech Column
Jan 23, 2024 · Information Security

Implementing Sa-Token Authentication and Authorization in Spring Cloud Gateway

This article demonstrates how to replace heavyweight Spring Security with the lightweight Sa-Token framework by configuring token generation, session management, role and permission retrieval, and global gateway filters in a Spring Cloud micro‑service architecture, including complete code examples and deployment tips.

AuthenticationAuthorizationJava
0 likes · 20 min read
Implementing Sa-Token Authentication and Authorization in Spring Cloud Gateway
Selected Java Interview Questions
Selected Java Interview Questions
Jan 20, 2024 · Backend Development

Implementing Sa-Token Authentication in Spring Cloud Gateway with Redis and Nacos

This article demonstrates how to replace heavyweight Spring Security with the lightweight Sa-Token framework by configuring token generation, session storage in Redis, service discovery via Nacos, and permission checks in a Spring Cloud Gateway micro‑service architecture, complete with code examples and deployment settings.

AuthenticationJavaMicroservices
0 likes · 21 min read
Implementing Sa-Token Authentication in Spring Cloud Gateway with Redis and Nacos
Architecture Development Notes
Architecture Development Notes
Jan 4, 2024 · Information Security

How to Implement Seamless, Secure Token Refresh for Modern Apps

This article explains the concept, workflow, and step‑by‑step implementation of a seamless token refresh mechanism, providing code examples and security best practices to keep user sessions alive without interruption while maintaining strong protection against token theft and replay attacks.

AuthenticationBackendSecurity
0 likes · 7 min read
How to Implement Seamless, Secure Token Refresh for Modern Apps
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jan 2, 2024 · Information Security

Master Spring Security: Custom Configurations, Filters, and Advanced Features

An in‑depth Spring Security guide covering custom configurations, authentication providers, user‑details services, path‑based authorization, role hierarchies, exception handling, custom filters, multiple filter chains, method security, internationalization, and session management, complete with practical code examples for Spring Boot 2.7.

AuthenticationAuthorizationJava
0 likes · 10 min read
Master Spring Security: Custom Configurations, Filters, and Advanced Features
macrozheng
macrozheng
Dec 30, 2023 · Backend Development

Master Single Sign-On (SSO) with SpringBoot, Vue & Uni‑App: A Hands‑On Guide

This article explains the concept, advantages, and implementation methods of Single Sign‑On (SSO) and provides two complete hands‑on examples—including architecture diagrams, database schema, configuration, and Java code for token‑based, ticket‑based, and RSA/AES encrypted SSO flows—using SpringBoot, Vue and Uni‑App.

AuthenticationJavaMicroservices
0 likes · 18 min read
Master Single Sign-On (SSO) with SpringBoot, Vue & Uni‑App: A Hands‑On Guide
php Courses
php Courses
Dec 25, 2023 · Backend Development

Top 10 Laravel Packages to Know in 2024

This article introduces the ten most noteworthy Laravel packages for 2024, covering authentication, markdown rendering, real‑time UI, image processing, debugging, search, Excel import/export, queue handling, localization, and automatic API generation, each with concise explanations and code examples.

APIAuthenticationLaravel
0 likes · 8 min read
Top 10 Laravel Packages to Know in 2024
php Courses
php Courses
Dec 23, 2023 · Backend Development

Implementing User Impersonation in Laravel with the Lab404 Impersonate Package

This guide explains how to add user impersonation to a Laravel application using the Lab404 Impersonate package, covering installation, service provider registration, session handling, helper functions, routing, and API methods for starting and ending impersonation sessions.

AuthenticationImpersonationLaravel
0 likes · 6 min read
Implementing User Impersonation in Laravel with the Lab404 Impersonate Package
Code Ape Tech Column
Code Ape Tech Column
Dec 19, 2023 · Information Security

Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms

This article explains the concept, advantages, and three implementation methods of Single Sign-On (SSO), then provides two complete practical examples—including architecture diagrams, step‑by‑step flows, and full Java code for ticket‑based and encrypted data‑based SSO—followed by supplementary RSA key generation notes and a brief promotional note.

AuthenticationBackendJava
0 likes · 18 min read
Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms
Liangxu Linux
Liangxu Linux
Nov 26, 2023 · Information Security

Understanding SSH: Ports, Authentication, and Encryption Explained

SSH (Secure Shell) is a widely used network security protocol that replaces insecure methods like Telnet and FTP by encrypting data and authenticating users, typically operating on port 22, and employing both symmetric and asymmetric encryption, key exchange, and various authentication methods such as passwords and public‑key pairs.

AuthenticationOpenSSHPutty
0 likes · 10 min read
Understanding SSH: Ports, Authentication, and Encryption Explained
Java High-Performance Architecture
Java High-Performance Architecture
Nov 21, 2023 · Information Security

Master Spring Security: Quick Start, JWT Authentication, and RBAC Authorization

This comprehensive guide walks you through setting up Spring Security in a Spring Boot project, configuring password encoding, implementing JWT-based authentication, building custom login and logout endpoints, managing user details with MyBatis Plus, and applying role‑based access control with custom permission handlers, all illustrated with complete code examples.

AuthenticationAuthorizationJWT
0 likes · 40 min read
Master Spring Security: Quick Start, JWT Authentication, and RBAC Authorization
Java Architect Essentials
Java Architect Essentials
Nov 19, 2023 · Backend Development

Designing a Multi‑Account Unified Login System: From Phone Number Authentication to Third‑Party Integration

This article explains how to design a scalable multi‑account login system, covering self‑built phone‑number authentication, optimized password‑less flows, third‑party integrations such as Weibo and WeChat, a refactored user‑basic and authorization schema, and the steps for implementing one‑click carrier‑based login.

AuthenticationDatabase designlogin
0 likes · 14 min read
Designing a Multi‑Account Unified Login System: From Phone Number Authentication to Third‑Party Integration
Open Source Linux
Open Source Linux
Nov 10, 2023 · Information Security

Understanding SSH: Ports, Workflow, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step process of establishing a secure connection, the role of symmetric and asymmetric encryption, and how password and public‑key authentication work with tools like PuTTY and OpenSSH.

AuthenticationOpenSSHPutty
0 likes · 8 min read
Understanding SSH: Ports, Workflow, and Key Authentication Explained
Architecture Digest
Architecture Digest
Nov 2, 2023 · Backend Development

Designing a Scalable Multi‑Account Login System: From Phone Number Registration to One‑Click Login

This article outlines the design of a flexible multi‑account authentication system, covering self‑built phone‑number registration, optimized password‑less login, integration of third‑party providers such as Weibo and WeChat, a split user/base‑authorization database schema, and a carrier‑based one‑click login flow.

Authenticationaccount‑designlogin
0 likes · 10 min read
Designing a Scalable Multi‑Account Login System: From Phone Number Registration to One‑Click Login
Code Ape Tech Column
Code Ape Tech Column
Oct 27, 2023 · Information Security

Why JWT Is Unsuitable for Session Management and Its Security Risks

This article explains why using JSON Web Tokens for session management is unsafe, detailing misconceptions about their benefits, highlighting security, scalability, and usability drawbacks, and finally outlining appropriate use cases such as short‑lived one‑time authorization tokens.

AuthenticationJWTSession Management
0 likes · 15 min read
Why JWT Is Unsuitable for Session Management and Its Security Risks
Open Source Tech Hub
Open Source Tech Hub
Oct 16, 2023 · Information Security

Mastering JWT Authentication in PHP: From Basics to Advanced Usage

This guide explains the limitations of traditional session authentication, introduces JSON Web Token (JWT) as a scalable cross‑domain solution, and provides step‑by‑step instructions for installing, configuring, generating, and validating JWTs in PHP applications, including supported algorithms and practical code examples.

APIAuthenticationJWT
0 likes · 9 min read
Mastering JWT Authentication in PHP: From Basics to Advanced Usage
Liangxu Linux
Liangxu Linux
Oct 15, 2023 · Information Security

Understanding SSH: Ports, Workflow, and Key Authentication Explained

SSH (Secure Shell) is a widely used network security protocol that replaces insecure methods like Telnet and FTP, operating over default port 22, supporting key exchange, encryption algorithms, multiple authentication methods, and session management, with tools such as PuTTY and OpenSSH for client connections.

AuthenticationOpenSSHPutty
0 likes · 10 min read
Understanding SSH: Ports, Workflow, and Key Authentication Explained
php Courses
php Courses
Sep 29, 2023 · Backend Development

Using PHP Sessions and Cookies to Enhance Web Applications

This article explains how PHP sessions and cookies work together to manage user data, improve authentication, shopping carts, and personalization, providing code examples and best practices for secure, seamless web application development.

AuthenticationPHPSessions
0 likes · 7 min read
Using PHP Sessions and Cookies to Enhance Web Applications
MaGe Linux Operations
MaGe Linux Operations
Sep 28, 2023 · Information Security

Mastering JWT: Standard Claims, Custom Tokens, and Renewal Strategies

This article explains JWT payload claims, lists standard and custom claims, shows how to generate a token with expiration in Java, and compares single‑token and double‑token renewal strategies—including OAuth 2.0 approaches and Redis‑based storage—to manage token expiration securely.

AuthenticationJWTJava
0 likes · 5 min read
Mastering JWT: Standard Claims, Custom Tokens, and Renewal Strategies
Top Architect
Top Architect
Sep 13, 2023 · Backend Development

Token Storage and Validation in Distributed Microservices Using Redis and Custom Annotations

This article explains how to generate, store, and validate login tokens across PC and mobile clients in a distributed microservice architecture, covering Redis storage, custom token entities, Spring service implementation, exception handling, client‑side storage utilities, and a custom annotation with an AOP aspect for request verification.

AuthenticationMicroservicesaspect-oriented
0 likes · 17 min read
Token Storage and Validation in Distributed Microservices Using Redis and Custom Annotations
Top Architecture Tech Stack
Top Architecture Tech Stack
Aug 31, 2023 · Information Security

Design of QR Code Login Functionality

This article explains the three-stage design of a QR code login system—including pending scan, scanned‑pending‑confirmation, and confirmed phases—detailing how unique QR IDs, token exchange, and user confirmation ensure secure authentication across PC and mobile devices.

AuthenticationBackendDesign
0 likes · 5 min read
Design of QR Code Login Functionality
Java Interview Crash Guide
Java Interview Crash Guide
Aug 29, 2023 · Backend Development

Designing a Scalable Multi‑Account Login System: Phone Verification to One‑Click Auth

This article outlines practical strategies for building a flexible multi‑account login architecture, covering traditional phone‑number/password registration, optimized password‑less flows, integration of third‑party providers such as Weibo, WeChat and QQ, a unified user‑base and authorization schema, and the implementation of carrier‑based one‑click authentication.

AuthenticationDatabase designlogin
0 likes · 14 min read
Designing a Scalable Multi‑Account Login System: Phone Verification to One‑Click Auth
JavaEdge
JavaEdge
Aug 20, 2023 · Information Security

Cookie vs Authorization Header: Which Token Storage Method Is Safer?

This article compares storing authentication tokens in cookies versus the Authorization header, outlining each method's implementation, advantages, drawbacks, security implications such as XSS and CSRF risks, cross‑domain considerations, and compliance with authentication standards.

AuthenticationToken StorageWeb Security
0 likes · 5 min read
Cookie vs Authorization Header: Which Token Storage Method Is Safer?
Su San Talks Tech
Su San Talks Tech
Aug 15, 2023 · Information Security

Master Spring Security & JWT: Build Secure Authentication in Spring Boot

This tutorial explains how to integrate Spring Security with JWT in a Spring Boot application, covering authentication and authorization concepts, filter chain principles, project setup, dependency configuration, security configuration classes, custom token filters, and the complete request‑authentication flow.

AuthenticationAuthorizationJWT
0 likes · 15 min read
Master Spring Security & JWT: Build Secure Authentication in Spring Boot
Didi Tech
Didi Tech
Aug 10, 2023 · Information Security

Security Hardening and Architecture of Didi's Elasticsearch Deployment

Didi hardened its massive Elasticsearch deployment—spanning 66 clusters and thousands of nodes—by adding a custom security plugin that authenticates requests at the cluster level, implementing a one‑click toggle and staged rolling upgrades, ultimately enabling authentication across all clusters and dramatically reducing data‑leak risk.

AuthenticationData ProtectionDidi
0 likes · 12 min read
Security Hardening and Architecture of Didi's Elasticsearch Deployment
Architect's Guide
Architect's Guide
Jul 28, 2023 · Information Security

OAuth 2.0 Overview, Authorization Modes, and Implementation for GitHub, QQ, and WeChat Login

This article provides a comprehensive introduction to OAuth 2.0, its core concepts, advantages and disadvantages, details four authorization flows, and presents step‑by‑step Java Spring Boot implementations for GitHub, QQ, and WeChat third‑party login, including database design considerations and code examples.

AuthenticationGitHubJava
0 likes · 21 min read
OAuth 2.0 Overview, Authorization Modes, and Implementation for GitHub, QQ, and WeChat Login
Java Architect Essentials
Java Architect Essentials
Jul 18, 2023 · Backend Development

Build QR‑Code Login with WebSocket in Spring Boot

This guide walks through designing a User_Token table, defining roles and APIs, implementing QR‑code generation and validation endpoints, and wiring a Spring Boot WebSocket server with front‑end AJAX to achieve secure, real‑time QR‑code login for Android, web and PC clients.

AuthenticationBackend DevelopmentJava
0 likes · 14 min read
Build QR‑Code Login with WebSocket in Spring Boot
Architect's Guide
Architect's Guide
Jul 17, 2023 · Information Security

Implementing API Key Authentication in Spring Security for REST APIs

This tutorial explains how to secure a Spring Boot REST API using API‑key authentication by adding the necessary Maven dependency, creating a custom filter, extending AbstractAuthenticationToken, configuring Spring Security, implementing a controller, and testing the endpoint with and without the API key.

API keyAuthenticationJava
0 likes · 9 min read
Implementing API Key Authentication in Spring Security for REST APIs
MaGe Linux Operations
MaGe Linux Operations
Jul 15, 2023 · Information Security

Top API Vulnerabilities Every Tester Should Know

This article surveys the most common API security flaws—including information disclosure, broken object‑level and function‑level authorization, over‑exposure of data, missing rate limits, mass‑assignment, misconfigurations, injection attacks, improper asset management, and business‑logic bugs—providing examples, code snippets, and practical testing tips for security professionals.

API SecurityAuthenticationBOLA
0 likes · 17 min read
Top API Vulnerabilities Every Tester Should Know
Selected Java Interview Questions
Selected Java Interview Questions
Jul 10, 2023 · Backend Development

Designing a Unified Multi‑Account Login System with Phone, Password, and Third‑Party Authentication

This article outlines a comprehensive approach to building a scalable multi‑account login system that supports phone‑number/password, phone‑number/verification‑code, and various third‑party OAuth providers, detailing workflow steps, database schema, advantages, drawbacks, and a one‑click login integration.

AuthenticationBackendaccount‑design
0 likes · 15 min read
Designing a Unified Multi‑Account Login System with Phone, Password, and Third‑Party Authentication
Test Development Learning Exchange
Test Development Learning Exchange
Jul 2, 2023 · Cloud Native

Understanding Kubernetes Ingress: Concepts, Core Components, and Practical Nginx Examples

This article explains what Kubernetes Ingress is, its core components, how to define Ingress rules with YAML, and provides practical examples using the Nginx Ingress Controller, including TLS support and basic authentication, to help manage traffic routing and load balancing in cloud‑native environments.

AuthenticationCloud NativeTLS
0 likes · 6 min read
Understanding Kubernetes Ingress: Concepts, Core Components, and Practical Nginx Examples
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2023 · Backend Development

Spring Security Overview: Core Features, Principles, Access Control Methods, Role vs Authority, Password Encryption, and Username/Password Authentication Flow

This article explains Spring Security's core functions, underlying filter‑based mechanism, various request‑access control methods, the distinction between hasRole and hasAuthority, how to encrypt passwords with BCryptPasswordEncoder, and the complete username‑password authentication process for securing backend applications.

AuthenticationAuthorizationBackend Security
0 likes · 10 min read
Spring Security Overview: Core Features, Principles, Access Control Methods, Role vs Authority, Password Encryption, and Username/Password Authentication Flow
Su San Talks Tech
Su San Talks Tech
Jun 14, 2023 · Backend Development

Delegating Authentication to Microservices with Custom Spring Annotations

This article explains how to move authentication from the gateway to individual Spring Cloud microservices by defining three custom annotations and an AOP aspect, while also covering Feign‑based calls and providing practical code examples for implementation.

AuthenticationAuthorizationCustom Annotations
0 likes · 9 min read
Delegating Authentication to Microservices with Custom Spring Annotations
Laravel Tech Community
Laravel Tech Community
Jun 13, 2023 · Information Security

Understanding Tokens, JWT, and Authentication Security

This article explains the principles, structure, and workflow of token‑based authentication—including access and refresh tokens, JWT, CSRF attacks, same‑origin policy, cross‑origin solutions, and common encryption algorithms—highlighting their advantages, limitations, and practical usage in modern web and mobile applications.

AuthenticationJWTSecurity
0 likes · 18 min read
Understanding Tokens, JWT, and Authentication Security
Programmer DD
Programmer DD
Jun 4, 2023 · Information Security

How to Secure Your ChatGPT‑Web Deployment from Free API Exploits

This article explains how the default title of the open‑source ChatGPT‑web project makes deployments vulnerable to discovery by asset‑search engines like FOFA and Shodan, leading to unauthorized API usage, and provides practical steps—changing the title and adding authentication—to protect the site and prevent unexpected costs.

AuthenticationChatGPT-webFOFA
0 likes · 6 min read
How to Secure Your ChatGPT‑Web Deployment from Free API Exploits
Java Architect Essentials
Java Architect Essentials
May 28, 2023 · Artificial Intelligence

Face-UI: Web-Based Facial Login System Using Spring Boot and Vue

This article introduces FACE-UI, a front‑back separated web application that implements facial login by capturing a photo via the browser, sending it to a Spring Boot backend, and using Tencent Cloud's face comparison API for authentication, with full setup instructions and code examples.

AuthenticationSpring BootTencent Cloud
0 likes · 4 min read
Face-UI: Web-Based Facial Login System Using Spring Boot and Vue
php Courses
php Courses
May 28, 2023 · Backend Development

Implementing Single Sign-On (SSO) with PHP: A Step-by-Step Guide

This tutorial explains how to build a PHP-based single sign‑on system using a main login application, a shared authentication service backed by MySQL and Redis, and multiple external applications, providing complete code examples for database setup, login handling, session sharing, and logout.

AuthenticationPHPSSO
0 likes · 8 min read
Implementing Single Sign-On (SSO) with PHP: A Step-by-Step Guide
Architects Research Society
Architects Research Society
May 24, 2023 · Information Security

Best Practices for Secure Remote Access to Industrial Control Systems (ICS)

This article explains why remote access to industrial control systems is essential, outlines the risks demonstrated by high‑profile attacks, and provides detailed best‑practice guidance—including DMZ architecture, authentication, jump hosts, file transfer, and policies for direct connections—to securely manage OT environments.

AuthenticationDMZICS
0 likes · 18 min read
Best Practices for Secure Remote Access to Industrial Control Systems (ICS)
Code Ape Tech Column
Code Ape Tech Column
May 24, 2023 · Backend Development

Sa-Token: A Lightweight Java Authentication and Authorization Framework

This article introduces Sa-Token, a lightweight Java permission authentication framework, explains why it was chosen over Spring Security and Shiro, details its core login and permission APIs, demonstrates integration with Spring Boot and WebFlux, and lists its extensive feature set for modern backend development.

AuthenticationAuthorizationBackend
0 likes · 21 min read
Sa-Token: A Lightweight Java Authentication and Authorization Framework
Sanyou's Java Diary
Sanyou's Java Diary
May 15, 2023 · Information Security

Master OAuth2: From Theory to Hands‑On Implementation with Spring Security

This article explains OAuth2 fundamentals, key terminology, and authorization flows, then guides you through setting up database tables, Spring Boot dependencies, resource and authorization server configurations, multiple grant types, token refresh, permission checks, and common pitfalls, providing complete code snippets and diagrams for a practical implementation.

AuthenticationAuthorization Code FlowBackend Development
0 likes · 17 min read
Master OAuth2: From Theory to Hands‑On Implementation with Spring Security
Java Architect Essentials
Java Architect Essentials
May 13, 2023 · Information Security

Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration

This article introduces the lightweight Sa-Token Java framework, explains its login and permission authentication mechanisms, demonstrates essential API usage with code examples, and provides step‑by‑step integration guides for SpringBoot and WebFlux, covering configuration, session handling, role checks, wildcard permissions, and global exception handling.

AuthenticationAuthorizationSa-Token
0 likes · 23 min read
Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration
Architect
Architect
Apr 30, 2023 · Information Security

Common API Vulnerabilities and How to Detect Them

This article explains the most frequent API security weaknesses—including information disclosure, broken object‑level and function‑level authorization, authentication bypass, over‑exposure of data, missing rate limits, mass‑assignment, misconfiguration, injection, asset mismanagement, and business‑logic flaws—providing detection techniques and illustrative code examples.

Authenticationinformation disclosureinjection
0 likes · 17 min read
Common API Vulnerabilities and How to Detect Them
MaGe Linux Operations
MaGe Linux Operations
Apr 25, 2023 · Backend Development

Choosing JWT vs Session: A Practical Guide to Secure Backend Authentication

This article compares JWT and session authentication, explains their differences, security and performance trade‑offs, and provides a complete Java implementation with Redis integration, guiding developers on selecting and implementing the most suitable authentication method for distributed backend systems.

AuthenticationJWTSecurity
0 likes · 14 min read
Choosing JWT vs Session: A Practical Guide to Secure Backend Authentication
Architect's Guide
Architect's Guide
Apr 20, 2023 · Information Security

OAuth 2.0: Principles, Architecture, and Implementation Overview

This article explains the fundamental concepts, roles, and step‑by‑step flow of OAuth 2.0, compares it with single sign‑on, describes the architecture of authorization, resource, and client servers, and clarifies related terminology such as authentication, federation, and delegated access.

APIAuthenticationOAuth2.0
0 likes · 11 min read
OAuth 2.0: Principles, Architecture, and Implementation Overview
Java High-Performance Architecture
Java High-Performance Architecture
Apr 5, 2023 · Backend Development

Master Spring Security: JWT, Custom Handlers, and Dynamic Permissions

This article provides a comprehensive guide to configuring Spring Security in a Java backend, covering Maven dependencies, global security settings, JWT token parsing, custom authentication providers, user details services, dynamic URL permission metadata, access decision management, and custom handlers for login, logout, and error responses, along with sample application.yml and database schema.

AuthenticationAuthorizationJWT
0 likes · 20 min read
Master Spring Security: JWT, Custom Handlers, and Dynamic Permissions
Top Architect
Top Architect
Mar 29, 2023 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the roles of resource owner, client, authorization server and resource server, outlines the step‑by‑step authorization flow, and clarifies related terminology such as authentication, federated identity, and delegated authorization.

AuthenticationAuthorizationOAuth2.0
0 likes · 13 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
TAL Education Technology
TAL Education Technology
Mar 23, 2023 · Frontend Development

The Principles Behind Front-End QR Code Login

This article explains the underlying mechanism of front‑end QR‑code login, detailing the roles of the PC page, mobile device, and server, and walks through the step‑by‑step process from generating the QR code to confirming login and issuing a token.

AuthenticationQR Code Loginclient-server
0 likes · 3 min read
The Principles Behind Front-End QR Code Login
政采云技术
政采云技术
Mar 21, 2023 · Information Security

Deep Dive into Spring Security Authentication Process and Core Components

This article provides a comprehensive analysis of Spring Security's authentication mechanism, detailing the filter chain, core components such as SecurityContextHolder, AuthenticationManager, ProviderManager, and AuthenticationProvider, and illustrating the step‑by‑step flow of username‑password verification with extensive code examples.

AuthenticationAuthenticationManagerJava
0 likes · 18 min read
Deep Dive into Spring Security Authentication Process and Core Components
政采云技术
政采云技术
Mar 21, 2023 · Information Security

In‑Depth Analysis of Spring Security Authentication Process and Core Components

This article provides a comprehensive walkthrough of Spring Security’s authentication mechanism, detailing the filter chain, core security components, and the underlying source‑code flow—from UsernamePasswordAuthenticationFilter through AuthenticationManager, ProviderManager, and DaoAuthenticationProvider—illustrated with code examples and diagrams.

AuthenticationAuthorizationBackend
0 likes · 20 min read
In‑Depth Analysis of Spring Security Authentication Process and Core Components
Top Architect
Top Architect
Mar 13, 2023 · Information Security

Understanding Single Sign‑On (SSO) and CAS Authentication Flows

This article explains the concept, background, and definition of Single Sign‑On (SSO), outlines three SSO deployment types, introduces the Central Authentication Service (CAS) with detailed ticket mechanisms, and provides step‑by‑step SSO and Single Logout (SLO) processes for multiple applications.

AuthenticationCASSSO
0 likes · 11 min read
Understanding Single Sign‑On (SSO) and CAS Authentication Flows
Java Architecture Diary
Java Architecture Diary
Mar 13, 2023 · Information Security

Why MaxKey Stands Out as a Leading Open-Source SSO Solution

MaxKey is an open-source, Apache-licensed SSO platform that supports major authentication protocols, offers extensive login methods, provides multi-tenant IAM features, and includes detailed Linux deployment steps with code snippets and interface screenshots, making it a comprehensive solution for enterprise identity management.

AuthenticationIAMJava
0 likes · 6 min read
Why MaxKey Stands Out as a Leading Open-Source SSO Solution
Bilibili Tech
Bilibili Tech
Mar 10, 2023 · Information Security

Data Security Construction in Berserker Platform

The article outlines Berserker’s comprehensive data‑security framework—built on the CIA triad and 5A methodology—that unifies authentication, authorization, access control, asset protection, and auditing across Hive, Kafka, ClickHouse and ETL tasks, describes the migration from version 1.0 to 2.0 with a redesigned permission system, workspaces, Casbin performance tweaks, and previews future fine‑grained, lifecycle‑wide security enhancements.

AuthenticationAuthorizationBerserker platform
0 likes · 15 min read
Data Security Construction in Berserker Platform