Tagged articles
653 articles
Page 4 of 7
Alibaba Cloud Native
Alibaba Cloud Native
Feb 27, 2023 · Cloud Native

How CNStack 2.0 Enables Multi‑Cloud, Multi‑Cluster Management with OCM

CNStack 2.0 introduces a cloud‑native multi‑cluster service built on Open Cluster Management, offering unified registration, lifecycle management, resource distribution, multi‑tenant authentication, and high‑availability cross‑cluster communication for Kubernetes clusters across clouds.

AuthenticationCloud NativeCluster Registration
0 likes · 15 min read
How CNStack 2.0 Enables Multi‑Cloud, Multi‑Cluster Management with OCM
MaGe Linux Operations
MaGe Linux Operations
Feb 26, 2023 · Information Security

Mastering JWT: Secure Token Authentication with Spring Boot and Angular

This article explains what JSON Web Tokens are, their structure and security considerations, introduces the JJWT Java library, and provides a complete Spring Boot and Angular example—including Maven setup, Java filters, controllers, and front‑end code—to demonstrate secure token‑based authentication.

AngularAuthenticationJWT
0 likes · 19 min read
Mastering JWT: Secure Token Authentication with Spring Boot and Angular
Top Architect
Top Architect
Feb 11, 2023 · Backend Development

Comprehensive Guide to User Login Flow, Token Management, and Anonymous Access in Backend Systems

This article explains the complete user login process, including mobile verification, token generation, token expiration policies, request‑rate limiting with Redis, anonymous request handling, blacklist management, and provides full Java Spring code examples for implementing these backend authentication mechanisms.

API SecurityAuthenticationBackend
0 likes · 11 min read
Comprehensive Guide to User Login Flow, Token Management, and Anonymous Access in Backend Systems
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2023 · Backend Development

Backend Token Authentication, Rate Limiting, and Anonymous Access Design

This article explains a comprehensive backend user login flow, covering token generation, expiration policies, request validation, logout handling, anonymous access strategies, rate‑limiting with authorized tokens, path‑regex filtering, blacklist management, and includes a Spring‑Redis implementation example.

AuthenticationBackendToken
0 likes · 9 min read
Backend Token Authentication, Rate Limiting, and Anonymous Access Design
macrozheng
macrozheng
Feb 1, 2023 · Information Security

Secure Your Spring Boot APIs with JWT: A Step‑by‑Step Guide Using Spring Security

This article explains how to replace Shiro with Spring Security, integrate JWT for stateless authentication, configure the filter chain, set up the necessary Maven dependencies, write the security configuration, custom authentication and verification filters, and manage user details in a Spring Boot backend.

AuthenticationAuthorizationSpring Boot
0 likes · 16 min read
Secure Your Spring Boot APIs with JWT: A Step‑by‑Step Guide Using Spring Security
Java High-Performance Architecture
Java High-Performance Architecture
Jan 29, 2023 · Information Security

Master Spring Security: From Quick Start to Advanced JWT Authentication and RBAC

This comprehensive guide walks you through Spring Security fundamentals, setting up a Spring Boot project, configuring authentication with JWT and Redis, implementing RBAC permission management, customizing error handling, enabling CORS, and addressing CSRF, providing complete code examples and detailed explanations for secure backend development.

AuthenticationAuthorizationJWT
0 likes · 45 min read
Master Spring Security: From Quick Start to Advanced JWT Authentication and RBAC
Alibaba Cloud Developer
Alibaba Cloud Developer
Jan 28, 2023 · Backend Development

Designing a Scalable User Authentication Model: From Simple Login to Real‑Person Verification

This article walks through the evolution of a user system—from a basic email/phone login to third‑party OAuth, multi‑type user accounts, diversified password schemes, and real‑person (entity) verification—showcasing a flexible, extensible backend design that can handle rapid business growth.

AuthenticationSystem DesignUser Management
0 likes · 13 min read
Designing a Scalable User Authentication Model: From Simple Login to Real‑Person Verification
IT Architects Alliance
IT Architects Alliance
Jan 27, 2023 · Backend Development

Mastering Session Management and SSO: From Cookies to CAS with Redis

This article analyzes the limitations of traditional HTTP session mechanisms in single‑server and clustered environments, explains why session sharing is essential for multi‑system products, and presents practical solutions such as session replication and centralized Redis storage, followed by a detailed walkthrough of CAS‑based single sign‑on implementation with Java Spring code examples and a comparison to OAuth2.

AuthenticationCASJava
0 likes · 15 min read
Mastering Session Management and SSO: From Cookies to CAS with Redis
Java High-Performance Architecture
Java High-Performance Architecture
Nov 23, 2022 · Information Security

Master Spring Security with JWT: Build a Secure Java Backend

This tutorial walks through setting up Spring Security with JWT in a Spring Boot project, covering environment configuration, Maven dependencies, custom authentication handlers, permission evaluation, JWT filtering, and testing, providing complete code examples and explanations for building a robust backend authentication system.

AuthenticationAuthorizationJWT
0 likes · 22 min read
Master Spring Security with JWT: Build a Secure Java Backend
Top Architect
Top Architect
Nov 23, 2022 · Information Security

Comprehensive Guide to Front‑End Authentication and Authorization Methods

This article provides an in‑depth overview of authentication, authorization, and permission control concepts and compares ten common front‑end authentication techniques—including HTTP Basic Auth, Session‑Cookie, Token, JWT, SSO, OAuth 2.0, QR‑code login and one‑click login—detailing their workflows, advantages, drawbacks, and typical usage scenarios.

AuthenticationAuthorizationJWT
0 likes · 39 min read
Comprehensive Guide to Front‑End Authentication and Authorization Methods
Architect
Architect
Nov 19, 2022 · Information Security

Understanding SSO and OAuth2.0: Concepts, Differences, and Implementation

This article explains the principles of Single Sign-On (SSO) and OAuth2.0, compares their concepts, outlines typical SSO workflows using CAS, details OAuth2.0 authorization code flow, clarifies terminology differences, and discusses related security frameworks such as Spring Security and Shiro.

AuthenticationOAuth2.0SSO
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Differences, and Implementation
Code Ape Tech Column
Code Ape Tech Column
Nov 15, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation

This article explains the principles and workflow of Single Sign‑On using OAuth2.0, illustrates the process with a real‑life analogy, and provides a complete Spring Boot example—including authorization server, client configuration, and role‑based access control—suitable for microservice architectures.

AuthenticationAuthorizationMicroservices
0 likes · 12 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation
Programmer DD
Programmer DD
Nov 14, 2022 · Backend Development

Choosing Between JWT and Session: Pros, Cons, and Implementation Guide

This article compares JWT and session authentication, outlines their differences, advantages, security considerations, performance impacts, and provides a complete Java implementation with Redis integration, helping developers decide the best approach for their projects.

AuthenticationJWTJava
0 likes · 16 min read
Choosing Between JWT and Session: Pros, Cons, and Implementation Guide
Top Architect
Top Architect
Nov 4, 2022 · Information Security

Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth

This article reviews four widely used authentication mechanisms—HTTP Basic authentication, session‑cookie based authentication, token (JWT) authentication, and OAuth 2.0—explaining their workflows, security characteristics, and providing Node.js/Express code examples for each.

AuthenticationExpressHTTP Basic
0 likes · 18 min read
Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth
Laravel Tech Community
Laravel Tech Community
Nov 1, 2022 · Information Security

Google Introduces Passkey Key‑Login for Android and Chrome: A Secure Alternative to Passwords

Google announced that Android and Chrome will now support Passkey key‑login, a biometric‑based, public‑key authentication method that replaces traditional passwords, allowing users to create a secure credential on their device, sync it across platforms, and developers to integrate it via WebAuthn and related APIs.

AndroidAuthenticationFIDO
0 likes · 4 min read
Google Introduces Passkey Key‑Login for Android and Chrome: A Secure Alternative to Passwords
Selected Java Interview Questions
Selected Java Interview Questions
Oct 29, 2022 · Information Security

Comprehensive Guide to Spring Security: Setup, Authentication, Authorization, and Advanced Configurations

This article provides a detailed tutorial on Spring Security, covering its core concepts, project setup, authentication flow, custom user details service, password encoding, login handling, role-based access control, CSRF protection, and integration with Thymeleaf, complete with code examples.

AuthenticationAuthorizationBackend
0 likes · 14 min read
Comprehensive Guide to Spring Security: Setup, Authentication, Authorization, and Advanced Configurations
MaGe Linux Operations
MaGe Linux Operations
Oct 26, 2022 · Information Security

Why Google’s New Passkey Is Replacing Passwords on Android and Chrome

Google announced that Android and Chrome will adopt Passkey, a biometric‑based, public‑key login system that replaces traditional passwords, offering cross‑platform support, phishing resistance, and cloud‑backed recovery, with developers able to integrate it via WebAuthn and Google Play Services.

AndroidAuthenticationChrome
0 likes · 4 min read
Why Google’s New Passkey Is Replacing Passwords on Android and Chrome
Architect
Architect
Oct 26, 2022 · Information Security

Choosing Between JWT and Session for Authentication: Technical Selection and Implementation

This article compares JWT and session authentication, discusses their differences, security, performance, and lifecycle considerations, and provides a complete Java implementation—including dependency configuration, token utilities, Redis integration, login/logout flows, password updates, and request interception—guiding developers to select the most suitable approach for their projects.

AuthenticationJWTJava
0 likes · 14 min read
Choosing Between JWT and Session for Authentication: Technical Selection and Implementation
Cloud Native Technology Community
Cloud Native Technology Community
Oct 25, 2022 · Cloud Native

Harbor: Cloud‑Native Docker Registry Authentication, Installation, and Image Push Guide

This article introduces Harbor, a CNCF‑hosted cloud‑native Docker registry, explains its token‑based authentication flow, details the required Kubernetes and Helm prerequisites, provides step‑by‑step installation and configuration instructions, and demonstrates how to push and pull images using containerd and Kubernetes.

AuthenticationDocker RegistryHarbor
0 likes · 17 min read
Harbor: Cloud‑Native Docker Registry Authentication, Installation, and Image Push Guide
ByteDance Cloud Native
ByteDance Cloud Native
Oct 24, 2022 · Cloud Native

How KubeGateway Solves kube‑apiserver Load‑Balancing and Traffic Governance

KubeGateway, a custom seven‑layer gateway built by ByteDance, eliminates kube‑apiserver load‑imbalance and adds comprehensive request governance—including routing, rate‑limiting, and degradation—by parsing HTTP2 traffic, supporting flexible policies, and transparently proxying requests without client changes.

AuthenticationKubernetesgateway
0 likes · 14 min read
How KubeGateway Solves kube‑apiserver Load‑Balancing and Traffic Governance
IT Architects Alliance
IT Architects Alliance
Oct 11, 2022 · Information Security

Understanding SSO: When to Choose SAML vs OAuth2 & OIDC

This article explains the fundamentals of Single Sign‑On (SSO), compares the two most common protocols—SAML and OAuth2 (with OpenID Connect)—covers their terminology, workflows, benefits, and provides guidance on which to use in different scenarios.

AuthenticationIdentity ManagementOAuth2
0 likes · 10 min read
Understanding SSO: When to Choose SAML vs OAuth2 & OIDC
IT Architects Alliance
IT Architects Alliance
Oct 7, 2022 · Information Security

Mastering RBAC and JWT with Spring Security: A Step‑by‑Step Guide

This comprehensive tutorial explains RBAC concepts, model classifications, and permission handling, then walks through implementing Spring Security with in‑memory authentication, JWT integration, custom JSON login filters, password encryption, and database‑backed authentication, providing complete code examples and configuration details.

AuthenticationAuthorizationJWT
0 likes · 18 min read
Mastering RBAC and JWT with Spring Security: A Step‑by‑Step Guide
Top Architect
Top Architect
Oct 6, 2022 · Information Security

RBAC Permission Analysis and Spring Security Implementation Guide

This article provides a comprehensive tutorial on role‑based access control (RBAC) concepts, model classifications, permission definitions, user‑group usage, and step‑by‑step implementations of Spring Security, JWT integration, JSON login, password encryption, and database authentication with extensive code examples.

AuthenticationBackend DevelopmentJWT
0 likes · 18 min read
RBAC Permission Analysis and Spring Security Implementation Guide
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Sep 29, 2022 · Information Security

Understanding SSO: When to Use SAML vs OAuth2 & OIDC

This article explains single sign‑on concepts, compares SAML, OAuth2 and OpenID Connect, outlines their benefits and typical workflows, and provides guidance on choosing the right protocol for different security and user‑experience scenarios.

AuthenticationAuthorizationOAuth2
0 likes · 9 min read
Understanding SSO: When to Use SAML vs OAuth2 & OIDC
Java High-Performance Architecture
Java High-Performance Architecture
Sep 26, 2022 · Information Security

Master Spring Security: From Basics to Advanced Customizations

This comprehensive guide walks you through Spring Security fundamentals, authentication flow, project setup, custom user details, password encoding, login handling, 403 error pages, remember‑me functionality, method security annotations, and CSRF protection, providing clear code examples for each topic.

AuthenticationAuthorizationCSRF
0 likes · 16 min read
Master Spring Security: From Basics to Advanced Customizations
Top Architect
Top Architect
Sep 25, 2022 · Backend Development

Design and Implementation of a Unified Authentication Center Using Spring Security OAuth2

This article provides a step‑by‑step tutorial on building a unified authentication center with Spring Security OAuth2, covering project module planning, authorization and resource server configuration, client module setup, gateway integration, and custom security components, complete with Maven dependencies and Java code examples.

AuthenticationBackend DevelopmentJava
0 likes · 15 min read
Design and Implementation of a Unified Authentication Center Using Spring Security OAuth2
Python Programming Learning Circle
Python Programming Learning Circle
Sep 19, 2022 · Backend Development

Flask‑Based Online Blog Platform Tutorial with User Authentication, Markdown Editing, and CRUD Operations

This article provides a step‑by‑step guide to building an online blog platform using Flask and MySQL, covering environment setup, database schema design, user registration and login, password encryption, CRUD operations for posts, Markdown editing, image upload, comment management, and error handling with full code examples.

AuthenticationCRUDFlask
0 likes · 26 min read
Flask‑Based Online Blog Platform Tutorial with User Authentication, Markdown Editing, and CRUD Operations
Programmer DD
Programmer DD
Sep 13, 2022 · Information Security

Master Spring Security: From Basics to Advanced Customizations

This guide walks through Spring Security fundamentals, including its core authentication and authorization mechanisms, project setup with Maven, customizing usernames, implementing UserDetailsService, creating custom PasswordEncoders, configuring login handling, role and authority checks, CSRF protection, remember‑me functionality, and using security annotations.

AuthenticationAuthorizationCSRF
0 likes · 17 min read
Master Spring Security: From Basics to Advanced Customizations
Code Ape Tech Column
Code Ape Tech Column
Sep 6, 2022 · Information Security

Customizing Spring Security FormLogin Authentication

This tutorial demonstrates how to set up a Spring Security FormLogin authentication flow, including creating a demo project, customizing the login page, configuring security rules, defining users and roles, and testing the login process with custom success and failure handlers.

AuthenticationJavaSpring Boot
0 likes · 11 min read
Customizing Spring Security FormLogin Authentication
Su San Talks Tech
Su San Talks Tech
Aug 31, 2022 · Backend Development

Mastering Login Authentication with Spring Cloud Gateway and JWT

This tutorial walks through implementing login authentication using Spring Cloud Gateway and JWT, covering core concepts of authentication, authorization, credential handling, token generation, gateway validation, service integration, and token refresh strategies within a microservice architecture.

AuthenticationBackend DevelopmentJWT
0 likes · 18 min read
Mastering Login Authentication with Spring Cloud Gateway and JWT
JD Tech
JD Tech
Aug 26, 2022 · Information Security

API Security Governance and Authentication Practices in JD Logistics Sorting Platform

This article examines security challenges encountered in JD Logistics' sorting platform, details the investigative process for abnormal API requests, proposes a SHA‑256 based authentication scheme with digital signatures, compares industry‑wide API protection methods, and shares practical insights from the author's experience in financial API gateway design.

API SecurityAuthenticationdigital signature
0 likes · 15 min read
API Security Governance and Authentication Practices in JD Logistics Sorting Platform
Java High-Performance Architecture
Java High-Performance Architecture
Aug 24, 2022 · Information Security

Mastering RBAC and Spring Security: From Basics to JWT Integration

This article provides a comprehensive guide to Role‑Based Access Control (RBAC) concepts, model classifications, and permission management, then walks through practical Spring Security setups—including basic usage, in‑memory authentication, JWT integration, JSON‑based login, password encryption, and database‑backed authentication, complete with code snippets and diagrams.

AuthenticationJWTJava
0 likes · 21 min read
Mastering RBAC and Spring Security: From Basics to JWT Integration
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 24, 2022 · Information Security

Mastering Custom Exception Handling in Spring Security (Spring Boot 2.4)

This guide explains how Spring Security processes authentication and authorization failures, walks through the default exception flow, and demonstrates multiple ways to customize error handling—including custom failure handlers, access‑denied pages, and JSON responses—using Spring Boot 2.4.12.

AuthenticationAuthorizationException Handling
0 likes · 12 min read
Mastering Custom Exception Handling in Spring Security (Spring Boot 2.4)
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationAuthorizationJWT
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
Top Architect
Top Architect
Aug 22, 2022 · Information Security

RBAC and Spring Security Tutorial: From Basic Role-Based Access Control to JWT Integration and JSON Login

This article provides a comprehensive guide on implementing role‑based access control (RBAC) with Spring Security, covering RBAC models, password encryption, in‑memory authentication, JWT integration, custom authentication filters for JSON login, and detailed configuration examples with full source code snippets.

AuthenticationJWTJava
0 likes · 16 min read
RBAC and Spring Security Tutorial: From Basic Role-Based Access Control to JWT Integration and JSON Login
Java Captain
Java Captain
Aug 21, 2022 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT and JSON Login

This article explains RBAC concepts and model classifications, demonstrates role‑based permission management, and provides step‑by‑step guides for using Spring Security with simple authentication, JWT token generation, JSON‑based login, password encryption, and database‑backed user authentication in Java applications.

AuthenticationJWTJava
0 likes · 15 min read
RBAC Permission Analysis and Spring Security Integration with JWT and JSON Login
Wukong Talks Architecture
Wukong Talks Architecture
Aug 15, 2022 · Backend Development

Implementing Login Authentication with Spring Cloud Gateway and JWT

This article explains how to integrate JWT-based login authentication into a Spring Cloud micro‑service architecture using Spring Cloud Gateway, detailing the authentication flow, token generation, gateway validation, service‑side user handling, and token refresh strategies with practical code examples.

AuthenticationJWTSpring Cloud
0 likes · 14 min read
Implementing Login Authentication with Spring Cloud Gateway and JWT
Top Architect
Top Architect
Aug 9, 2022 · Backend Development

Implementing a JWT-Based Authentication Center with Spring Boot and Java

This article provides a comprehensive guide to building a JWT authentication service in Java, covering JWT fundamentals, Spring Boot configuration, entity and DAO definitions, service interfaces, token generation and parsing, RSA key handling, controller endpoints, testing procedures, and a comparison with traditional session-based authentication.

AuthenticationJWTJava
0 likes · 20 min read
Implementing a JWT-Based Authentication Center with Spring Boot and Java
IT Architects Alliance
IT Architects Alliance
Aug 4, 2022 · Information Security

Understanding Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation

This article explains traditional session and authentication mechanisms, the problems of session sharing in clustered and multi‑service environments, and presents practical SSO solutions—including CAS‑based single sign‑on and its differences from OAuth2—accompanied by complete Java Spring code examples.

AuthenticationCASJava
0 likes · 16 min read
Understanding Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation
Programmer DD
Programmer DD
Aug 4, 2022 · Backend Development

Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2

This article explains the limitations of traditional HTTP session mechanisms, explores session sharing strategies in clustered environments, and provides a detailed walkthrough of implementing Single Sign-On using CAS, including code samples and a comparison with OAuth2 authentication.

AuthenticationCASJava
0 likes · 18 min read
Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2
Java Backend Technology
Java Backend Technology
Jul 31, 2022 · Backend Development

Mastering Single Sign-On (SSO) with CAS: From Session Basics to Full Demo

This article explains why unified authentication is essential for product suites, reviews traditional session mechanisms and their limitations in clustered environments, explores session‑sharing strategies, introduces CAS‑based SSO workflows, compares CAS with OAuth2, and provides a complete Spring Boot demo with code snippets and configuration details.

AuthenticationCASSSO
0 likes · 17 min read
Mastering Single Sign-On (SSO) with CAS: From Session Basics to Full Demo
Java Architect Essentials
Java Architect Essentials
Jul 20, 2022 · Information Security

Spring Security Based System Permission Management Tutorial

This article provides a comprehensive step‑by‑step guide on building a permission management system with Spring Security, covering database design, entity classes, Maven configuration, security configuration, dynamic menu loading, front‑end rendering using Thymeleaf, and complete testing with sample code and screenshots.

AuthenticationAuthorizationSpring Boot
0 likes · 19 min read
Spring Security Based System Permission Management Tutorial
Architecture Digest
Architecture Digest
Jul 17, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Java Backend

This tutorial explains what SSO and CAS are, outlines the required development environment, walks through downloading, building, and deploying the CAS Server, shows how to configure the server and client (including disabling HTTPS for testing), and demonstrates successful cross‑application authentication with code examples.

AuthenticationCASJava
0 likes · 7 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Java Backend
Aotu Lab
Aotu Lab
Jul 14, 2022 · Backend Development

Monet: Building a Unified API Gateway with Spring Cloud Gateway

Monet is a custom API gateway built on Spring Cloud Gateway that consolidates multiple platform endpoints into a single domain, providing unified routing, API management via Zookeeper, authentication and authorization, dynamic rate‑limiting with Sentinel, and extensible monitoring, addressing scalability and operational challenges of the Linglong platform.

AuthenticationBackend DevelopmentSpring Cloud Gateway
0 likes · 10 min read
Monet: Building a Unified API Gateway with Spring Cloud Gateway
Top Architect
Top Architect
Jul 11, 2022 · Information Security

Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot

This article explains how to integrate the CAS (Central Authentication Service) single sign‑on solution into a Spring Boot backend by adding necessary dependencies, configuring a series of CAS filters, creating a custom MyAuthenticationFilter to handle AJAX requests, and demonstrating a Vue.js frontend that interacts with the authentication flow, complete with screenshots of the login, ticket validation, and logout processes.

AuthenticationCASSecurity
0 likes · 14 min read
Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot
ELab Team
ELab Team
Jul 7, 2022 · Information Security

Is Your Password Really Secure? Hashing, Salting, and WebAuthn Explained

This article examines why passwords are often insecure, explains how they should be stored using hash algorithms and salts, outlines common password‑weaknesses and system vulnerabilities, and introduces FIDO/WebAuthn as a modern, password‑less authentication solution.

AuthenticationFIDOHashing
0 likes · 31 min read
Is Your Password Really Secure? Hashing, Salting, and WebAuthn Explained
Code Ape Tech Column
Code Ape Tech Column
Jul 5, 2022 · Information Security

Understanding and Implementing HttpBasic Authentication in Spring Security

This article explains the classic HttpBasic authentication mode in Spring Security, its limited use cases, how to integrate it with a Spring Boot project by adding Maven dependencies and configuration code, and details the underlying Base64‑based mechanism with step‑by‑step illustrations.

AuthenticationBackendHttpBasic
0 likes · 6 min read
Understanding and Implementing HttpBasic Authentication in Spring Security
Top Architect
Top Architect
Jun 29, 2022 · Information Security

OAuth 2.0 Protocol Overview and Grant Types

This article provides a comprehensive introduction to the OAuth 2.0 protocol, covering its core concepts, authorization flow, four grant types (authorization code, implicit, resource owner password credentials, client credentials), request and response parameters, token handling, and practical examples with code snippets.

AuthenticationAuthorizationGrant Types
0 likes · 22 min read
OAuth 2.0 Protocol Overview and Grant Types
IT Services Circle
IT Services Circle
Jun 23, 2022 · Information Security

Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions

This article provides an in‑depth overview of JSON Web Tokens (JWT), explaining their structure, authentication workflow, advantages such as statelessness and CSRF protection, drawbacks like revocation difficulty, and presents practical solutions including blacklist, secret rotation, short‑lived tokens and refresh‑token strategies.

AuthenticationBackendCSRF
0 likes · 13 min read
Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions
IT Architects Alliance
IT Architects Alliance
Jun 22, 2022 · Information Security

Secure RPC Encryption: Authentication, Anti‑Hijacking Design & Implementation

This article examines the challenges of securing API interfaces—including authentication for third‑party services and protection against request hijacking—and proposes a comprehensive RPC encryption framework that uses asymmetric and symmetric keys, signed payloads, and HTTPS fallback, detailing both client‑side and server‑side workflows, data structures, and providing links to the full source code.

API SecurityAuthenticationRPC encryption
0 likes · 5 min read
Secure RPC Encryption: Authentication, Anti‑Hijacking Design & Implementation
Alibaba Cloud Native
Alibaba Cloud Native
Jun 21, 2022 · Cloud Native

What’s New in KubeVela 1.4? Secure Multi‑Cluster Delivery, Visual Topology, and VelaD

KubeVela 1.4 introduces built‑in multi‑cluster authentication and authorization, a resource‑topology visualizer, the lightweight VelaD runtime, dozens of new plugins, and a host of workflow enhancements, while outlining the project’s roadmap for observability, workflow and application management.

AuthenticationAuthorizationCloud Native
0 likes · 15 min read
What’s New in KubeVela 1.4? Secure Multi‑Cluster Delivery, Visual Topology, and VelaD
IT Architects Alliance
IT Architects Alliance
Jun 19, 2022 · Backend Development

Four Ways to Implement Generic Auth in Spring Boot: AOP, Interceptor, ArgumentResolver, and Filter

This article explains how to add a universal app‑key whitelist authentication feature to a Spring‑Boot web framework by using four different mechanisms—traditional AOP, HandlerInterceptor, custom HandlerMethodArgumentResolver, and a Servlet Filter—while comparing their execution order and extensibility.

ArgumentResolverAuthenticationInterceptor
0 likes · 10 min read
Four Ways to Implement Generic Auth in Spring Boot: AOP, Interceptor, ArgumentResolver, and Filter
Java Architecture Diary
Java Architecture Diary
Jun 13, 2022 · Information Security

Step-by-Step Guide to OAuth2 Token Generation and Authentication Flow

This article walks through the complete OAuth2 token generation process, covering gateway pre‑processing, client authentication, request handling, authentication object assembly, password validation, token creation, storage options, and response handling with code examples and diagrams.

AuthenticationBackendToken Generation
0 likes · 5 min read
Step-by-Step Guide to OAuth2 Token Generation and Authentication Flow
Top Architect
Top Architect
Jun 10, 2022 · Information Security

Understanding JWT Claims and Token Renewal Strategies

This article explains the standard JWT claims, demonstrates how to generate a token with custom claims in Java, and compares single‑token and double‑token renewal schemes, including practical steps for handling expiration, refresh logic, and Redis‑based token storage.

AuthenticationBackend DevelopmentJWT
0 likes · 8 min read
Understanding JWT Claims and Token Renewal Strategies
IT Architects Alliance
IT Architects Alliance
Jun 3, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign-On using the CAS (Central Authentication Service) framework, covering the concepts of SSO and CAS, required development environment, server-side deployment, client configuration, and end‑to‑end testing with detailed code examples.

AuthenticationCASJava
0 likes · 8 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration
Top Architect
Top Architect
May 29, 2022 · Information Security

Step‑by‑Step Guide to Building a CAS‑Based Single Sign‑On (SSO) System with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign‑On using the open‑source CAS solution, covering the concepts of SSO and CAS, required development environment, server‑side deployment, client integration with Spring Boot, configuration details, and a complete end‑to‑end testing workflow.

AuthenticationCASJava
0 likes · 9 min read
Step‑by‑Step Guide to Building a CAS‑Based Single Sign‑On (SSO) System with Server and Client Configuration
Snowball Engineer Team
Snowball Engineer Team
May 24, 2022 · Cloud Native

How Snowball Used Apache APISIX to Build a Dual‑Active Architecture and Streamline Authentication

This article details Snowball's transition from a single‑datacenter setup to a dual‑active, cloud‑native architecture using Apache APISIX, covering background challenges, problem analysis, gateway selection, architectural adjustments, authentication unification, observability enhancements, ZooKeeper integration, and future plans.

Apache APISIXAuthenticationCloud Native
0 likes · 11 min read
How Snowball Used Apache APISIX to Build a Dual‑Active Architecture and Streamline Authentication
G7 EasyFlow Tech Circle
G7 EasyFlow Tech Circle
May 20, 2022 · Backend Development

Securing Public‑Facing Kafka: Authentication, Configuration, and Scaling Strategies

This article shares G7 Tech’s practical experience of exposing Kafka to the public internet, covering encryption, AAA, three authentication schemes, listener configuration, scaling for massive topics with Kubernetes, storage optimization, and integration with the gmq management platform and Kafka‑REST.

AuthenticationKafkaKubernetes
0 likes · 10 min read
Securing Public‑Facing Kafka: Authentication, Configuration, and Scaling Strategies
Python Programming Learning Circle
Python Programming Learning Circle
May 14, 2022 · Backend Development

Python Book Management System with CRUD Operations and User Authentication

This article presents a Python command‑line book management system that supports adding, searching, deleting, modifying, and displaying books stored in a text file, and extends it with a simple login‑registration feature using file‑based user data, illustrating full CRUD operations and basic authentication.

AuthenticationCRUDbook-management
0 likes · 10 min read
Python Book Management System with CRUD Operations and User Authentication
Top Architect
Top Architect
Apr 28, 2022 · Information Security

SSL VPN Technology Overview and Configuration Guide

This article provides a comprehensive overview of SSL VPN technology, covering its encryption principles, limitations of IPSec, virtual gateway functions, web proxy, file sharing, port forwarding, network expansion modes, endpoint security checks, certificate‑based authentication methods, typical application scenarios, and step‑by‑step configuration procedures.

AuthenticationEndpoint SecuritySSL VPN
0 likes · 9 min read
SSL VPN Technology Overview and Configuration Guide
Baidu Geek Talk
Baidu Geek Talk
Apr 25, 2022 · Information Security

Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC

Baidu’s ToB Account Permission Platform provides a unified, configurable login and permission service—including multi‑tenant account management, SSO, OAuth, and the GD‑RBAC model—delivering secure, high‑performance access for over ten million enterprise accounts across multiple product lines.

AuthenticationAuthorizationBackend
0 likes · 27 min read
Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC
Programmer DD
Programmer DD
Apr 23, 2022 · Information Security

How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step handshake process—including connection establishment, version and algorithm negotiation, key exchange, and user authentication methods—while also describing common clients like PuTTY and OpenSSH and the role of symmetric and asymmetric encryption.

AuthenticationOpenSSHPutty
0 likes · 11 min read
How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained
Architecture Digest
Architecture Digest
Apr 23, 2022 · Information Security

SSL VPN Technology Overview and Configuration Guide

This article provides a comprehensive overview of SSL VPN technology, detailing its advantages over IPSec, core functions such as virtual gateways, web proxy, file sharing, port forwarding, network extension, endpoint security, logging, authentication methods, typical application scenarios, and step‑by‑step configuration procedures.

AuthenticationEndpoint SecuritySSL VPN
0 likes · 9 min read
SSL VPN Technology Overview and Configuration Guide
IT Architects Alliance
IT Architects Alliance
Apr 22, 2022 · Information Security

Implementing Single Sign-On with Spring Security and JWT – A Comprehensive Guide

This article provides a detailed, step‑by‑step tutorial on building a Spring Security‑based Single Sign‑On solution using JWT, covering SSO concepts, JWT structure, RSA encryption, custom authentication filters, Maven project setup, configuration files, and full code examples for both authentication and resource services.

AuthenticationJWTJava
0 likes · 22 min read
Implementing Single Sign-On with Spring Security and JWT – A Comprehensive Guide
Architects Research Society
Architects Research Society
Apr 21, 2022 · Backend Development

Best Practices for Building a SaaS Product – Part I

This article outlines essential SaaS product building guidelines, covering core feature definition, authentication, email notifications, multi‑tenant strategies, payment handling, hosted backend APIs, document‑oriented databases, hosted databases, and background processing with serverless and message‑bus solutions.

AuthenticationSaaSmulti-tenant
0 likes · 11 min read
Best Practices for Building a SaaS Product – Part I
Top Architect
Top Architect
Apr 21, 2022 · Information Security

Implementing Single Sign-On with Spring Security and JWT

This article provides a comprehensive 20,000‑word guide on building a Spring Security‑based single sign‑on solution using JWT, covering the SSO concept, token structure, RSA encryption, Maven project setup, configuration files, custom authentication and verification filters, and end‑to‑end testing with Postman.

AuthenticationJWTJava
0 likes · 23 min read
Implementing Single Sign-On with Spring Security and JWT
Top Architect
Top Architect
Apr 5, 2022 · Information Security

Understanding JSON Web Token (JWT): Structure, Creation, and Signature

This article explains the lightweight JWT specification, demonstrates how to build a token with header, payload, and signature using Base64 encoding and Node.js, and discusses its security properties, verification process, and suitable use cases for web authentication.

AuthenticationBase64JWT
0 likes · 9 min read
Understanding JSON Web Token (JWT): Structure, Creation, and Signature
Architect's Guide
Architect's Guide
Mar 27, 2022 · Information Security

Understanding JSON Web Tokens (JWT): Structure, Creation, and Practical Use

This article explains the lightweight JWT specification, walks through its three-part structure (header, payload, signature), shows how to encode and sign a token with Node.js, and demonstrates using a JWT‑based link to perform a friend‑request operation without requiring the recipient to log in.

AuthenticationBase64JWT
0 likes · 8 min read
Understanding JSON Web Tokens (JWT): Structure, Creation, and Practical Use
Top Architect
Top Architect
Mar 15, 2022 · Information Security

Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases

This article explains the fundamental differences between JSON Web Token (JWT) and OAuth2, describes how each works, provides code examples of JWT structure, outlines OAuth2 roles and flows, and discusses practical scenarios, advantages, and drawbacks for securing APIs.

API SecurityAuthenticationAuthorization
0 likes · 12 min read
Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases
Top Architect
Top Architect
Mar 8, 2022 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the three main participants, outlines the complete authorization flow with step‑by‑step details, defines key terminology, and discusses deployment scenarios such as web servers, user‑agent apps, and native applications.

APIAuthenticationAuthorization
0 likes · 11 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
360 Quality & Efficiency
360 Quality & Efficiency
Mar 4, 2022 · Information Security

Integrating Apache Shiro with Spring Boot: Core Components, Configuration, and Authentication Flow

This article provides a comprehensive guide on integrating Apache Shiro into a Spring Boot application, covering core components, Maven configuration, bean definitions, security manager setup, custom realms, filter chain configuration, and the complete login authentication flow with code examples.

Apache ShiroAuthenticationAuthorization
0 likes · 12 min read
Integrating Apache Shiro with Spring Boot: Core Components, Configuration, and Authentication Flow
Top Architect
Top Architect
Jan 18, 2022 · Information Security

Comprehensive Spring Security Guide: Authentication, Authorization, Custom Configurations, and CSRF Protection

This article provides an in‑depth tutorial on Spring Security, covering its core concepts, authentication flow, project setup, dependency imports, custom UserDetailsService, password encoding, login handling, role‑based access control, CSRF protection, and integration with Thymeleaf, complete with practical code examples.

AuthenticationAuthorizationCSRF
0 likes · 16 min read
Comprehensive Spring Security Guide: Authentication, Authorization, Custom Configurations, and CSRF Protection
Architecture Digest
Architecture Digest
Jan 17, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation

This article explains the principles and workflow of Single Sign-On (SSO) using OAuth2.0, illustrates the process with a real‑life scenario, compares multi‑point and single‑point login, and provides a complete Spring Boot example for building an authorization server, client, and role‑based access control in micro‑service architectures.

AuthenticationAuthorizationMicroservices
0 likes · 10 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation
Top Architect
Top Architect
Jan 10, 2022 · Information Security

Understanding OAuth2.0 Single Sign‑On (SSO) and Its Implementation with SpringBoot

This article explains the principles of Single Sign‑On using OAuth2.0, illustrates the workflow with a real‑world analogy, and provides a complete SpringBoot example—including authorization server, client configuration, role‑based access control, and micro‑service integration—so readers can master SSO implementation and security design.

AuthenticationAuthorizationOAuth2
0 likes · 14 min read
Understanding OAuth2.0 Single Sign‑On (SSO) and Its Implementation with SpringBoot