Tagged articles
653 articles
Page 6 of 7
Liangxu Linux
Liangxu Linux
Jan 12, 2021 · Information Security

What Is a Bastion Host and How Does It Secure Operations?

This article explains the concept, purpose, design principles, functional modules, authentication methods, deployment options, and open‑source implementations of bastion hosts, highlighting how they centralize control, audit, and protect privileged access to servers and network devices.

AuthenticationBastion HostDeployment
0 likes · 9 min read
What Is a Bastion Host and How Does It Secure Operations?
MaGe Linux Operations
MaGe Linux Operations
Jan 10, 2021 · Operations

How to Install and Configure Cntlm Proxy on Linux and Windows

Learn how to install Cntlm on Debian‑based Linux or Windows, configure its authentication and proxy settings, obtain NTLM hashes, and apply changes by reloading or restarting the systemd service, enabling secure multi‑user HTTP proxy access within restricted networks.

AuthenticationNTLMProxy
0 likes · 4 min read
How to Install and Configure Cntlm Proxy on Linux and Windows
Code Ape Tech Column
Code Ape Tech Column
Jan 8, 2021 · Information Security

Implementing Single Sign‑On (SSO) in B/S Systems: Cookie, Authentication Center, and LocalStorage Approaches

This article explains how Single Sign‑On works in browser‑server applications, compares three implementation methods—parent‑domain cookies, a dedicated authentication center, and cross‑domain LocalStorage with iframe/postMessage—and provides sample code for the latter technique.

AuthenticationCookieSSO
0 likes · 10 min read
Implementing Single Sign‑On (SSO) in B/S Systems: Cookie, Authentication Center, and LocalStorage Approaches
Architecture Digest
Architecture Digest
Dec 25, 2020 · Information Security

Token-Based Identity Authentication System: Classification, Scenarios, and Hierarchical Design

This article analyzes token-based identity authentication in multi‑client information systems, classifies various token types, compares their natural and controllable attributes, proposes a four‑layer hierarchy, and discusses practical usage scenarios and design principles to improve security and privacy.

AuthenticationSecuritySession
0 likes · 9 min read
Token-Based Identity Authentication System: Classification, Scenarios, and Hierarchical Design
Fulu Network R&D Team
Fulu Network R&D Team
Dec 23, 2020 · Information Security

Practical Implementation of IdentityServer4 in the Fuluteng Project

This article provides a hands‑on guide to using IdentityServer4 in the Fuluteng project, covering signing credentials, client and resource stores, persisted grant storage with Redis, various OAuth2 grant types including client credentials, authorization code, password, and custom extensions such as SMS and third‑party logins, and demonstrates role‑based authorization and JWT configuration.

ASP.NET CoreAuthenticationCustom Grant
0 likes · 26 min read
Practical Implementation of IdentityServer4 in the Fuluteng Project
Programmer DD
Programmer DD
Dec 16, 2020 · Information Security

Spring Security OAuth2 Callback Authentication Explained: Managers & Providers

This article explores how Spring Security processes OAuth2 login callbacks, detailing the role of AuthenticationManager, the creation of OAuth2LoginAuthenticationToken, the selection of appropriate AuthenticationProvider such as OAuth2LoginAuthenticationProvider and OidcAuthorizationCodeAuthenticationProvider, and the subsequent generation of OAuth2User and token objects.

AuthenticationBackend DevelopmentJava
0 likes · 4 min read
Spring Security OAuth2 Callback Authentication Explained: Managers & Providers
Java Architect Essentials
Java Architect Essentials
Nov 25, 2020 · Information Security

API Interface Security: AccessKey/SecretKey, Token/AppKey, Signature Generation and Replay‑Attack Prevention

The article explains how to secure API interfaces by using AccessKey/SecretKey or Token/AppKey for identity verification, generating request signatures to prevent parameter tampering, and applying timestamp‑nonce mechanisms to defend against replay attacks, while providing concrete implementation examples in code.

API SecurityAccessKeyAuthentication
0 likes · 8 min read
API Interface Security: AccessKey/SecretKey, Token/AppKey, Signature Generation and Replay‑Attack Prevention
Laravel Tech Community
Laravel Tech Community
Nov 16, 2020 · Backend Development

Laravel User Authentication Setup and Configuration Guide

This guide walks through the prerequisites, installation via Composer, key generation, and detailed configuration of Laravel's authentication system, including environment setup, file settings, controller examples, route definitions, middleware validation, and testing procedures for a functional backend.

AuthenticationLaravelmiddleware
0 likes · 3 min read
Laravel User Authentication Setup and Configuration Guide
macrozheng
macrozheng
Nov 16, 2020 · Backend Development

Boost API Testing: How to Integrate Swagger with Postman for Seamless Debugging

This guide shows how to import Swagger-generated API definitions into Postman, configure environment variables, handle authentication tokens, and use Postman for efficient API debugging, while noting the limitations of documentation display compared to Swagger.

API testingAuthenticationBackend Development
0 likes · 6 min read
Boost API Testing: How to Integrate Swagger with Postman for Seamless Debugging
360 Tech Engineering
360 Tech Engineering
Nov 9, 2020 · Information Security

Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth

This article explains the principles and workflows of typical authentication mechanisms—including HTTP Basic authentication, cookie‑based sessions, JSON Web Tokens, and OAuth—detailing their encryption processes, storage strategies, token refresh techniques, and security considerations for modern web applications.

AuthenticationHTTPJWT
0 likes · 12 min read
Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth
php Courses
php Courses
Nov 5, 2020 · Backend Development

Advanced Laravel Authentication Customizations and Tips

This article provides a comprehensive guide to customizing Laravel's built‑in authentication system, covering route parameters, controller generation, password confirmation, device logout, redirect logic, user creation via Tinker and factories, login throttling, and additional credential checks, all with practical code examples.

AuthRoutesAuthenticationBackend
0 likes · 12 min read
Advanced Laravel Authentication Customizations and Tips
Alibaba Cloud Developer
Alibaba Cloud Developer
Oct 30, 2020 · Mobile Development

How to Build an iOS 14 Widget for Hema Town: From Auth to UI

This article explains how to create an iOS 14 home‑screen Widget for the Hema Town mini‑game, covering design goals, platform restrictions, authentication handling, data timeline updates, SwiftUI UI implementation, bundle splitting, Swift bridging, analytics, review pitfalls, and post‑release considerations.

AuthenticationData RefreshMobile Development
0 likes · 11 min read
How to Build an iOS 14 Widget for Hema Town: From Auth to UI
MaGe Linux Operations
MaGe Linux Operations
Oct 29, 2020 · Backend Development

Master HTTP Requests with Python httpx: GET, POST, PUT, Streaming & More

This guide walks you through using the Python httpx library to perform various HTTP methods—including GET, POST, PUT, DELETE, HEAD, and OPTIONS—handle query parameters, decode responses, work with JSON, custom headers, form data, file uploads, streaming, cookies, redirects, and authentication, all with clear code examples.

APIAuthenticationHTTP
0 likes · 10 min read
Master HTTP Requests with Python httpx: GET, POST, PUT, Streaming & More
New Oriental Technology
New Oriental Technology
Oct 23, 2020 · Backend Development

Nginx: A Comprehensive Guide

This article provides an in-depth overview of Nginx, covering its introduction, architecture, and various modules, including real IP and rewrite modules, with practical examples and configuration details.

AuthenticationBackend DevelopmentHTTP server
0 likes · 13 min read
Nginx: A Comprehensive Guide
Top Architect
Top Architect
Oct 15, 2020 · Information Security

Spring Security Guide: Authentication, Authorization, and Web Security

This comprehensive Spring Security guide explains core concepts of authentication and access control, details the AuthenticationManager and ProviderManager interfaces, shows how to customize authentication managers, configure authorization with AccessDecisionManager, secure web requests with filter chains, and apply method-level security, including asynchronous contexts.

AuthenticationAuthorizationJava
0 likes · 23 min read
Spring Security Guide: Authentication, Authorization, and Web Security
Efficient Ops
Efficient Ops
Oct 14, 2020 · Information Security

Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication

This article traces the evolution from early stateless web browsing to modern token‑based authentication, explaining how session management challenges led to centralized stores, their drawbacks, and how signed tokens using HMAC‑SHA256 provide a scalable, secure, and truly stateless alternative.

AuthenticationHMACSession
0 likes · 15 min read
Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication
ITPUB
ITPUB
Sep 24, 2020 · Backend Development

Designing GraphQL for Microservices: Key Challenges, Solutions, and Best Practices

This article explains what GraphQL is, how its type system and Relay standard work, the N+1 problem, and presents three architectural approaches—prefixing, schema stitching, and RPC composition—for integrating GraphQL into microservices, along with authentication, authorization, and routing considerations.

AuthenticationAuthorizationGraphQL
0 likes · 34 min read
Designing GraphQL for Microservices: Key Challenges, Solutions, and Best Practices
Selected Java Interview Questions
Selected Java Interview Questions
Sep 23, 2020 · Backend Development

Implementing Single Sign-On (SSO) in Web Applications: Cookie, Authentication Center, and LocalStorage Approaches

This article explains three practical methods for achieving Single Sign‑On in web systems—using a parent‑domain cookie, deploying a dedicated authentication center, and leveraging front‑end LocalStorage with iframe postMessage—to share session or token information across multiple domains.

AuthenticationCookieSSO
0 likes · 11 min read
Implementing Single Sign-On (SSO) in Web Applications: Cookie, Authentication Center, and LocalStorage Approaches
Swan Home Tech Team
Swan Home Tech Team
Sep 16, 2020 · Information Security

Understanding Account System Capabilities, Authentication, and Security

This article provides a comprehensive overview of the PASSPORT account system, detailing its registration process, login mechanisms, authentication methods, security challenges, system evolution, and stability considerations to guide developers in building robust and secure user identity services.

AuthenticationAuthorizationPassport
0 likes · 8 min read
Understanding Account System Capabilities, Authentication, and Security
Laravel Tech Community
Laravel Tech Community
Sep 8, 2020 · Backend Development

Unified Multi-Account Login: Architecture, Flow, and Database Design

This article explains the technical solutions for unified multi‑account login in web applications, covering early‑stage username/password and mobile verification flows, detailed process steps, OAuth2.0 third‑party integration, and comprehensive database schema design for local and third‑party user authentication.

AuthenticationBackendDatabase design
0 likes · 8 min read
Unified Multi-Account Login: Architecture, Flow, and Database Design
Programmer DD
Programmer DD
Sep 4, 2020 · Backend Development

How to Integrate QQ Login in Spring Boot: Step‑by‑Step Guide

This tutorial walks you through registering a QQ Connect application, adding the required Maven dependency, creating the login page, implementing the Spring Boot controller and AuthComment utility class, configuring Freemarker, and handling the OAuth flow to achieve seamless QQ authentication in a Java backend.

AuthenticationBackendOAuth
0 likes · 10 min read
How to Integrate QQ Login in Spring Boot: Step‑by‑Step Guide
Java Captain
Java Captain
Aug 23, 2020 · Information Security

Unified Multi‑Account Login: Architecture, Flow, and Database Design

This article explains the concept of multi‑account unified login in internet applications, detailing early‑stage username/password and mobile‑based authentication flows, the evolution to third‑party OAuth2 integration, and provides comprehensive database schema designs for local and third‑party user accounts.

AuthenticationOAuth2third-party
0 likes · 10 min read
Unified Multi‑Account Login: Architecture, Flow, and Database Design
Architecture Digest
Architecture Digest
Aug 4, 2020 · Information Security

Integrating Apache Shiro with Spring Boot for Authentication and Authorization

This guide demonstrates how to integrate Apache Shiro into a Spring Boot application, covering project setup, Maven dependencies, configuration of Redis-backed session and cache management, creation of utility and realm classes, and implementation of role‑based permission controls with example controllers and Postman testing.

AuthenticationAuthorizationJava
0 likes · 22 min read
Integrating Apache Shiro with Spring Boot for Authentication and Authorization
Java Captain
Java Captain
Jul 26, 2020 · Information Security

Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT

This article explains the fundamentals of authentication and authorization, the roles of credentials, cookies, sessions, various token types including access and refresh tokens, and details the structure, generation, and usage of JWTs, while comparing security considerations and distributed session sharing strategies.

AuthenticationAuthorizationCookie
0 likes · 21 min read
Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT
21CTO
21CTO
Jul 22, 2020 · Information Security

Why RESTful API Security Matters and How to Protect Your APIs

This article explains the critical importance of securing RESTful APIs—covering data protection, DoS risks, and business impact—and outlines practical measures such as authentication, API keys, access control, rate limiting, and input validation with code examples.

API SecurityAuthenticationRESTful API
0 likes · 8 min read
Why RESTful API Security Matters and How to Protect Your APIs
MaGe Linux Operations
MaGe Linux Operations
Jul 17, 2020 · Databases

Master MongoDB: Essential CRUD, Queries, Tools, and User Management Guide

This comprehensive tutorial covers MongoDB fundamentals, including CRUD operations, display commands, conditional queries, updates, deletions, essential tools like mongod and mongostat, authentication mechanisms, role definitions, configuration settings, and step‑by‑step user and admin creation for secure database management.

AuthenticationCRUDMongoDB
0 likes · 17 min read
Master MongoDB: Essential CRUD, Queries, Tools, and User Management Guide
vivo Internet Technology
vivo Internet Technology
Jun 17, 2020 · Mobile Development

Integrating Fingerprint Authentication on Android: APIs, Implementation Steps, and Advanced Usage

Google’s fingerprint API, introduced in Android 6.0, can be integrated via the legacy FingerprintManager or the newer BiometricPrompt, using a wrapper that abstracts version differences, handling permissions, hardware checks, authentication callbacks, and optional reflection to retrieve fingerprint IDs and enrolled fingerprint lists for advanced login scenarios.

APIAndroidAuthentication
0 likes · 14 min read
Integrating Fingerprint Authentication on Android: APIs, Implementation Steps, and Advanced Usage
Liangxu Linux
Liangxu Linux
Jun 11, 2020 · Backend Development

How to Build a Unified Multi‑Account Login System with Third‑Party OAuth

This article explains the technical design of a unified multi‑account login system, covering early‑stage username/password and phone‑based authentication, detailed flow steps, database schema, and integration of third‑party OAuth (e.g., QQ) while highlighting practical considerations and limitations.

AuthenticationOAuth2database-design
0 likes · 10 min read
How to Build a Unified Multi‑Account Login System with Third‑Party OAuth
Big Data Technology & Architecture
Big Data Technology & Architecture
May 26, 2020 · Information Security

Step-by-Step Guide to Integrating Kerberos Authentication with the Cloudera Platform

This article provides a comprehensive tutorial on Kerberos fundamentals, its authentication workflow, and detailed procedures for installing, configuring, and enabling Kerberos security on a Cloudera (Hadoop) cluster running on CentOS, including code snippets, configuration files, and post‑deployment testing steps.

AuthenticationBig DataCloudera
0 likes · 17 min read
Step-by-Step Guide to Integrating Kerberos Authentication with the Cloudera Platform
Architecture Digest
Architecture Digest
Apr 28, 2020 · Information Security

Understanding Spring Security Integration with Servlet Applications

This article explains how Spring Security integrates with Servlet‑based Java web applications by detailing the servlet filter chain, DelegatingFilterProxy, FilterChainProxy, SecurityFilterChain, and providing code examples to help readers grasp authentication and authorization mechanisms.

AuthenticationFilter ChainJava
0 likes · 7 min read
Understanding Spring Security Integration with Servlet Applications
Java Architecture Diary
Java Architecture Diary
Apr 20, 2020 · Backend Development

How to Customize OAuth2 Tokens with Business Data in Spring Security

This article explains how to extend the default OAuth2 token response by embedding business-related fields such as tenant_id, user_id, and username, and walks through the underlying Spring Security code—including the password grant flow, token creation, and enhancement process—illustrated with code snippets and diagrams.

AuthenticationOAuth2Token Customization
0 likes · 5 min read
How to Customize OAuth2 Tokens with Business Data in Spring Security
Programmer DD
Programmer DD
Apr 20, 2020 · Information Security

Essential API Security Measures and How to Implement Them

This article outlines key security mechanisms for public APIs—including data encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—and provides practical Java code examples for each technique.

API SecurityAuthenticationdata encryption
0 likes · 11 min read
Essential API Security Measures and How to Implement Them
Laravel Tech Community
Laravel Tech Community
Apr 20, 2020 · Backend Development

Implementing JWT Authentication API in Laravel

This guide walks through installing the tymon/jwt-auth package, configuring Laravel, creating middleware for CORS and JWT verification, defining API routes, building an authentication controller, and testing the registration and login endpoints using tools like Postman or AJAX.

APIAuthenticationBackend
0 likes · 7 min read
Implementing JWT Authentication API in Laravel
Laravel Tech Community
Laravel Tech Community
Apr 14, 2020 · Backend Development

Master Laravel Authentication: From Scaffold to Custom Guard

This guide walks you through Laravel's built‑in authentication scaffolding, database requirements, route and view generation, customizing redirects, usernames, guards, validation, and storage, plus advanced techniques like manual authentication, HTTP basic auth, custom guards, and user providers, all with clear code examples.

AuthenticationBackendGuard
0 likes · 22 min read
Master Laravel Authentication: From Scaffold to Custom Guard
Laravel Tech Community
Laravel Tech Community
Apr 14, 2020 · Backend Development

Laravel Password Reset Implementation Guide

This guide explains how to enable Laravel's built‑in password reset feature by running the make:auth command, configuring the user model, migrating the reset token table, setting up routes and views, customizing guards, brokers, and notification emails, and adjusting token expiration.

AuthenticationBackendLaravel
0 likes · 6 min read
Laravel Password Reset Implementation Guide
macrozheng
macrozheng
Apr 10, 2020 · Backend Development

Understanding Cookies, Sessions, and JWT: A Complete Guide to Web Authentication

This article explains how cookies and sessions compensate for HTTP's stateless nature, details their creation, types, and limitations, compares them with JSON Web Tokens, and provides guidance on choosing the appropriate authentication method for different application scales and security requirements.

AuthenticationJWTSession
0 likes · 16 min read
Understanding Cookies, Sessions, and JWT: A Complete Guide to Web Authentication
Java Architecture Diary
Java Architecture Diary
Mar 18, 2020 · Information Security

How OAuth2 Token Validation, Generation, and Refresh Really Work

This article explains the complete OAuth2 token lifecycle—including how resource servers validate incoming tokens, how the authorization server creates and reuses access tokens, and the mechanisms for passive and active token refresh—complete with Java code examples and practical client‑side strategies.

AuthenticationBackendOAuth2
0 likes · 7 min read
How OAuth2 Token Validation, Generation, and Refresh Really Work
MaGe Linux Operations
MaGe Linux Operations
Feb 24, 2020 · Information Security

Session vs JWT: When to Choose Token‑Based Authentication

This article explains the differences between authentication and authorization, compares session‑based and token‑based (JWT) authentication flows, details JWT structure and signing, and outlines the advantages, disadvantages, and suitable scenarios for each method.

AuthenticationBackendJWT
0 likes · 9 min read
Session vs JWT: When to Choose Token‑Based Authentication
Architecture Digest
Architecture Digest
Dec 29, 2019 · Information Security

Spring Security Guide: Authentication, Authorization, and Customizing Filter Chains

This guide introduces Spring Security fundamentals, explaining authentication and authorization concepts, the core interfaces such as AuthenticationManager and AccessDecisionManager, how to configure them with Spring Boot, customize filter chains, apply method‑level security, and handle thread‑bound security contexts for asynchronous processing.

AuthenticationAuthorizationJava
0 likes · 18 min read
Spring Security Guide: Authentication, Authorization, and Customizing Filter Chains
dbaplus Community
dbaplus Community
Dec 16, 2019 · Databases

MySQL 8.0 vs MariaDB 10.4: Authentication, InnoDB, Clone, Optimizer & Backup Highlights

This article compares key new features of MySQL 8.0 and MariaDB 10.4—including authentication plugin changes, Unix‑socket auth, atomic DDL, instant column adds, clone plugin usage, optimizer enhancements, resource groups, query‑rewrite, and backup tools—providing step‑by‑step commands, code snippets, and practical caveats for database upgrades.

AuthenticationBackupMariaDB
0 likes · 21 min read
MySQL 8.0 vs MariaDB 10.4: Authentication, InnoDB, Clone, Optimizer & Backup Highlights
21CTO
21CTO
Dec 16, 2019 · Information Security

How SSO Works: From CAS Architecture to Real‑World Implementation

This article explains the background, architecture, and step‑by‑step authentication flow of Single Sign‑On systems, covering the classic CAS framework, Java implementation details, and Taobao's extended SSO design with code examples.

AuthenticationCASJava
0 likes · 8 min read
How SSO Works: From CAS Architecture to Real‑World Implementation
Programmer DD
Programmer DD
Dec 10, 2019 · Backend Development

Master JWT Authentication in Spring Security: From Basics to Implementation

This guide walks you through the various HTTP authentication methods, explains JWT Bearer authentication, and demonstrates how to implement a custom JwtAuthenticationFilter in Spring Security, configure it, and use JWT tokens for securing API endpoints, including token refresh handling.

AuthenticationBackendJWT
0 likes · 15 min read
Master JWT Authentication in Spring Security: From Basics to Implementation
Programmer DD
Programmer DD
Dec 1, 2019 · Information Security

How to Build an Extensible Form Login with Spring Security

This tutorial walks through customizing Spring Security to create a scalable, extensible form‑login mechanism, covering the basic login flow, Spring Security's built‑in login options, FormLoginConfigurer settings, practical controller code, security configuration, and how to add multiple login types such as JSON or CAPTCHA.

AuthenticationCustom Filterform login
0 likes · 11 min read
How to Build an Extensible Form Login with Spring Security
Programmer DD
Programmer DD
Nov 26, 2019 · Information Security

Understanding Cookies, Sessions, and Tokens: When and How to Use Each

This article explains the fundamental differences between cookies, sessions, and tokens, outlines how each works in web authentication, compares their security and performance trade‑offs, and offers practical guidance on storage, encryption, and best practices for implementing token‑based authentication.

AuthenticationCookieSession
0 likes · 13 min read
Understanding Cookies, Sessions, and Tokens: When and How to Use Each
IT Architects Alliance
IT Architects Alliance
Nov 21, 2019 · Backend Development

How Cookies, Sessions, and Tokens Keep Web Users Logged In

This article explains the stateless nature of HTTP and how cookies, server‑side sessions, and token‑based authentication work together to maintain user state across requests, including their storage limits, lifecycle, and practical implementation steps.

AuthenticationBackendSession
0 likes · 8 min read
How Cookies, Sessions, and Tokens Keep Web Users Logged In
Programmer DD
Programmer DD
Nov 3, 2019 · Information Security

Spring Security vs Apache Shiro: Which Java Security Framework Wins?

This article compares Spring Security and Apache Shiro, explaining their authentication and authorization features, filter‑chain mechanisms, RBAC model, and related security concepts to help Java developers choose the right framework for production‑grade web applications.

Apache ShiroAuthenticationRBAC
0 likes · 6 min read
Spring Security vs Apache Shiro: Which Java Security Framework Wins?
Selected Java Interview Questions
Selected Java Interview Questions
Nov 2, 2019 · Information Security

Understanding Single Sign-On (SSO) Mechanisms: Shared Session, OpenID, Cookie, and Cross‑Domain Solutions

This article explains the principles of single sign‑on and compares several practical implementations—including shared session via Redis, OpenID‑based authentication, cookie‑based OpenID storage, and cross‑domain JSONP techniques—while also discussing their limitations and security considerations.

AuthenticationOpenIDSSO
0 likes · 8 min read
Understanding Single Sign-On (SSO) Mechanisms: Shared Session, OpenID, Cookie, and Cross‑Domain Solutions
21CTO
21CTO
Oct 2, 2019 · Information Security

Mastering SSO: Session Sharing, OpenID, and Cross‑Domain Strategies

This article explores practical approaches to Single Sign‑On, comparing shared Session, OpenID‑based, and cookie‑based implementations, addressing scalability, cross‑domain challenges, and security considerations to help developers choose the right SSO solution for their architecture.

AuthenticationOpenIDSSO
0 likes · 8 min read
Mastering SSO: Session Sharing, OpenID, and Cross‑Domain Strategies
Java Captain
Java Captain
Sep 25, 2019 · Backend Development

Implementing QQ and Weibo One‑Click Login in a Java Backend

This guide details how to design the backend, database schema, authentication flow, and Java code required to integrate QQ and Weibo one‑click login for a website, covering token handling, user data retrieval, and practical security considerations.

AuthenticationJavaOAuth
0 likes · 14 min read
Implementing QQ and Weibo One‑Click Login in a Java Backend
Architecture Digest
Architecture Digest
Sep 16, 2019 · Backend Development

Designing a Unified Multi-Account Login System: Schemas, Flows, and One-Click Authentication

This article outlines the design of a unified multi‑account login system, covering self‑built phone‑number authentication, optimized password‑less login, third‑party integrations, database schema separation, and a one‑click carrier‑based login to improve user experience and scalability.

AuthenticationSecurityaccount‑design
0 likes · 16 min read
Designing a Unified Multi-Account Login System: Schemas, Flows, and One-Click Authentication
Architects Research Society
Architects Research Society
Sep 14, 2019 · Backend Development

Understanding API Gateways and Their Role in Microservice Architectures

This article explains what an API gateway is, why it is essential in microservice architectures, and how it handles cross‑cutting concerns such as authentication, transport security, load balancing, request routing, dependency resolution, and data transformation, illustrated with a simple Node.js gateway example and code snippets.

AuthenticationNode.jsapi-gateway
0 likes · 11 min read
Understanding API Gateways and Their Role in Microservice Architectures
Java Captain
Java Captain
Sep 1, 2019 · Information Security

Integrating Apache Shiro with Spring Boot: Configuration, Session Management, and Permission Control

This tutorial demonstrates how to integrate the lightweight Apache Shiro security framework into a Spring Boot 2.1.5 project, covering environment setup, Maven dependencies, Redis session storage, custom utilities, Shiro configuration, permission annotations, test controllers, and Postman verification.

AuthenticationAuthorizationJava
0 likes · 27 min read
Integrating Apache Shiro with Spring Boot: Configuration, Session Management, and Permission Control
Programmer DD
Programmer DD
Aug 10, 2019 · Information Security

Secure Your Spring Boot App with Apache Shiro: Auth, Authz, and Redis

This article walks through integrating Apache Shiro into a Spring Boot project to handle authentication, authorization, session management, and caching, including custom realms, Redis-backed sessions, and cache managers, while providing detailed code examples and configuration guidance.

Apache ShiroAuthenticationAuthorization
0 likes · 20 min read
Secure Your Spring Boot App with Apache Shiro: Auth, Authz, and Redis
Ziru Technology
Ziru Technology
Jul 25, 2019 · Backend Development

Why Did Our CAS Login Fail? Uncovering Session Sharing Issues and Fixes

A July 3 CAS extension caused login failures due to inconsistent JSESSIONID handling across servers, leading to redirects and authentication errors, which were traced to missing memory‑cache configuration and resolved by removing the misconfigured node and restoring proper session sharing.

AuthenticationSessionjsessionid
0 likes · 9 min read
Why Did Our CAS Login Fail? Uncovering Session Sharing Issues and Fixes
MaGe Linux Operations
MaGe Linux Operations
Jul 20, 2019 · Operations

When a Production Database Vanishes: Lessons from a Dev’s Nightmare

A developer recounts how a misconfigured production environment led to the accidental deletion of both content and user databases, the frantic scramble to diagnose the issue, the discovery of a backup oversight, and the hard‑earned lessons on backups, testing, and authentication security.

AuthenticationBackupdatabase
0 likes · 9 min read
When a Production Database Vanishes: Lessons from a Dev’s Nightmare
Java Captain
Java Captain
May 21, 2019 · Backend Development

QR Code Login Mechanism: Web and Mobile Interaction Overview

This article explains the QR‑code login process, detailing how the web front‑end, server, Redis store, and mobile application cooperate to generate a QR code, verify the scan, and complete user authentication using tokens and UUIDs.

AuthenticationBackendMobile
0 likes · 5 min read
QR Code Login Mechanism: Web and Mobile Interaction Overview
Java Captain
Java Captain
Apr 22, 2019 · Information Security

Token‑Based Authentication: Classification, Scenarios, and Hierarchical Design

This article analyses various client‑side authentication scenarios, classifies tokens into password, session, and API categories, compares their natural and controllable attributes, and proposes a four‑layer hierarchical token architecture to improve security, usability, and decoupling across multiple platforms.

AuthenticationSecurityToken
0 likes · 13 min read
Token‑Based Authentication: Classification, Scenarios, and Hierarchical Design
Tencent Cloud Developer
Tencent Cloud Developer
Apr 12, 2019 · Information Security

Comprehensive Overview of Authentication: From Historical Tokens to Modern OAuth 2.0 and WeChat Mini‑Program Practices

The article surveys authentication from ancient token methods to modern password and session techniques, explains OAuth 2.0 flows and their adaptation for WeChat Mini‑Programs—including access‑token retrieval, simplified client‑credentials grants, and cloud‑call automation—while also previewing future trends such as biometrics, blockchain‑based decentralization, and AI‑driven trust models.

AuthenticationOAuth 2.0Security
0 likes · 13 min read
Comprehensive Overview of Authentication: From Historical Tokens to Modern OAuth 2.0 and WeChat Mini‑Program Practices
360 Tech Engineering
360 Tech Engineering
Apr 9, 2019 · Cloud Native

Microservice Gateway (Kong) and Container Service Integration

This article explains microservice architecture and the role of API gateways, introduces Kong as a high‑availability gateway, and provides a step‑by‑step guide for deploying containerized AI services (face, pet, and content moderation) and integrating them with Kong for authentication, rate‑limiting, and secure access.

AuthenticationCloud NativeKong
0 likes · 7 min read
Microservice Gateway (Kong) and Container Service Integration
58 Tech
58 Tech
Mar 22, 2019 · Backend Development

Architecture Overview of the 58 Open Platform: API Gateway, Fault Tolerance, Rate Limiting, and Real‑time Messaging

The article details the evolution and current architecture of the 58 Open Platform, covering its API gateway, multi‑protocol support, authentication mechanisms, distributed rate‑limiting, circuit‑breaking, thread‑pool isolation, and a Netty‑based real‑time message‑push system, while outlining future service‑marketplace and serverless plans.

AuthenticationCircuit BreakingMessage Push
0 likes · 13 min read
Architecture Overview of the 58 Open Platform: API Gateway, Fault Tolerance, Rate Limiting, and Real‑time Messaging
Java Architecture Diary
Java Architecture Diary
Mar 20, 2019 · Information Security

Extending Spring OAuth2 Token Validation to Populate Full User Details

This article explains how to customize the default OAuth2 check‑token flow in Spring Cloud by extending the token converter to assemble complete user information—including IDs, department and tenant data—directly into the security context, eliminating extra database queries and improving performance.

AuthenticationJavaOAuth2
0 likes · 5 min read
Extending Spring OAuth2 Token Validation to Populate Full User Details
Architects Research Society
Architects Research Society
Feb 20, 2019 · Backend Development

Understanding API Gateways: Roles, Implementation, and a Node.js Example

This article explains what API gateways are, why they are essential in micro‑service architectures, outlines the cross‑cutting concerns they address such as authentication, transport security, load balancing, request routing, dependency resolution and data transformation, and provides a practical Node.js implementation with code samples.

AuthenticationTransport Securityapi-gateway
0 likes · 13 min read
Understanding API Gateways: Roles, Implementation, and a Node.js Example
DevOps Cloud Academy
DevOps Cloud Academy
Jan 17, 2019 · Operations

How to Install and Configure the SonarQube GitLab Authentication Plugin

This guide explains how to download, install, and configure the SonarQube GitLab authentication plugin, including plugin installation via Maven, setting up a GitLab application with HTTPS, configuring SonarQube authentication parameters, and troubleshooting common redirect URL errors.

AuthenticationConfigurationDevOps
0 likes · 2 min read
How to Install and Configure the SonarQube GitLab Authentication Plugin
Tencent Cloud Developer
Tencent Cloud Developer
Dec 26, 2018 · Backend Development

Cloud Development for Mini Programs: Simplifying Backend Services

Cloud development for mini programs streamlines backend creation by offering a document database, CDN‑linked storage, and server‑less functions, letting developers focus on business logic while eliminating server purchases, domain setup, and complex configuration, and providing unified authentication, one‑click provisioning, and future‑ready API extensions.

Authenticationapi-integrationbackend services
0 likes · 10 min read
Cloud Development for Mini Programs: Simplifying Backend Services
Tencent Cloud Developer
Tencent Cloud Developer
Dec 18, 2018 · Information Security

Designing a Relatively Secure Account System: Authentication, Authorization, and Auditing

Designing a relatively secure account system requires integrating strong multi-factor authentication, fine-grained authorization models like RBAC or ABAC, and continuous real-time and offline auditing to mitigate breaches, while recognizing that absolute security is impossible and ongoing vigilance is essential.

AuthenticationAuthorizationaccess control
0 likes · 17 min read
Designing a Relatively Secure Account System: Authentication, Authorization, and Auditing
21CTO
21CTO
Nov 28, 2018 · Backend Development

Why Laravel’s Powerful Features Can Supercharge Your PHP Development

This article introduces Laravel, a modern PHP framework, highlighting its MVC architecture, robust ORM, Blade templating, streamlined routing, controller organization, and built‑in authentication, while providing code examples to show how these features boost developer productivity.

AuthenticationBladeLaravel
0 likes · 6 min read
Why Laravel’s Powerful Features Can Supercharge Your PHP Development
58 Tech
58 Tech
Oct 10, 2018 · Information Security

Account Integration Solutions for 58 Group: Merging, Linking, and Cloud Account Platform

This article examines the challenges of unifying multiple independent account systems within 58 Group and presents three technical approaches—full account merging, account linking with single sign‑on, and a unified cloud account platform—detailing their benefits, difficulties, and implementation considerations.

AuthenticationSecuritySingle Sign-On
0 likes · 11 min read
Account Integration Solutions for 58 Group: Merging, Linking, and Cloud Account Platform
Java Captain
Java Captain
Sep 6, 2018 · Backend Development

Implementation Principles of QR Code Login

This article explains the architecture and step‑by‑step workflow of QR code login, covering how the web front‑end, mobile client, and server (including Redis storage and token verification) cooperate to generate a QR code, poll for authentication, and complete a secure user login.

AuthenticationMobileQR Code Login
0 likes · 7 min read
Implementation Principles of QR Code Login
21CTO
21CTO
Sep 2, 2018 · Information Security

How API Gateways Strengthen API Security: Benefits, Risks, and Best Practices

This article explores the critical role of API gateways in securing APIs, covering their advantages, drawbacks, common threats, authentication methods, communication safeguards, logging practices, and a shortlist of popular open‑source gateway solutions.

API SecurityAuthenticationThreat Protection
0 likes · 10 min read
How API Gateways Strengthen API Security: Benefits, Risks, and Best Practices
Python Programming Learning Circle
Python Programming Learning Circle
Aug 11, 2018 · Backend Development

Top 8 Essential Laravel Packages for Building Robust APIs

This article introduces eight indispensable Laravel packages—ranging from debugging and JWT authentication to ACL management, data transformation, UUID generation, image handling, push notifications, and automated backups—that together streamline and enhance the development of API‑centric backend applications.

API developmentAuthenticationLaravel
0 likes · 5 min read
Top 8 Essential Laravel Packages for Building Robust APIs