Tagged articles
653 articles
Page 7 of 7
Big Data and Microservices
Big Data and Microservices
Aug 4, 2018 · Information Security

How CAS Enables Secure Single Sign-On: Architecture and Workflow Explained

CAS (Central Authentication Service) is an open‑source, enterprise‑grade single sign‑on solution that centralizes user authentication across trusted systems, offering reduced login time, improved security, and streamlined user management, with a clear protocol flow involving service tickets, redirects, and encrypted cookies.

AuthenticationCASSSO
0 likes · 5 min read
How CAS Enables Secure Single Sign-On: Architecture and Workflow Explained
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jul 30, 2018 · Information Security

Understanding OAuth2.0 Authorization Code Grant Flow

This article explains the OAuth2.0 authorization code grant flow, using a Douban‑QQ login example to illustrate the three-step process from client request to token exchange and user information retrieval, and provides a simple reference implementation on GitHub.

AuthenticationAuthorization CodeOAuth Flow
0 likes · 7 min read
Understanding OAuth2.0 Authorization Code Grant Flow
Big Data and Microservices
Big Data and Microservices
Jul 23, 2018 · Information Security

Understanding Apache Shiro: Core Concepts and Architecture Explained

This article introduces Apache Shiro, a lightweight Java security framework, and explains its three core concepts—Subject, SecurityManager, and Realms—while detailing the full system architecture including authenticators, authorizers, session management, caching, and cryptography components.

Apache ShiroAuthenticationAuthorization
0 likes · 5 min read
Understanding Apache Shiro: Core Concepts and Architecture Explained
Java Architect Essentials
Java Architect Essentials
May 28, 2018 · Information Security

How to Secure RESTful APIs: Authentication, Encryption, and Authorization Strategies

This guide explains the three core pillars of RESTful API security—client authentication, data encryption, and post‑authentication authorization—detailing practical methods such as signature keys, HTTP Basic/Digest, OAuth, SSL, selective encryption with salts, and role‑based access control.

AuthenticationAuthorizationHTTP Digest
0 likes · 4 min read
How to Secure RESTful APIs: Authentication, Encryption, and Authorization Strategies
Meituan Technology Team
Meituan Technology Team
May 17, 2018 · Information Security

Performance Optimization and Monitoring of Kerberos KDC Service

The article examines Kerberos KDC performance issues on Meituan‑Dianping’s data platform, showing that PREAUTH halves throughput while RAID10 has little effect, and that a single‑CPU core limits QPS; deploying 40 processes and disabling PREAUTH raises throughput over tenfold, and a lock‑free shared‑memory monitoring module with the kstat tool provides real‑time metrics for troubleshooting.

AuthenticationKDCKerberos
0 likes · 17 min read
Performance Optimization and Monitoring of Kerberos KDC Service
ITPUB
ITPUB
May 5, 2018 · Databases

What Happens When You Accidentally Delete a Production Database? Lessons Learned

A developer recounts a terrifying production database deletion, discovers a mis‑configured database pointer, learns the critical importance of backups, and shares hard‑won authentication lessons and four practical steps to turn such failures into future success.

Authenticationlessonsproduction
0 likes · 9 min read
What Happens When You Accidentally Delete a Production Database? Lessons Learned
JD Retail Technology
JD Retail Technology
Apr 18, 2018 · Information Security

Secure One‑Time Token Design for Long‑Connection Services

The article explains the challenges of protecting long‑connection services from abuse and presents a one‑time secure token architecture—including gateway SDK, token generation, Redis caching, and verification modules—to ensure authentication, prevent replay attacks, and improve service robustness.

AuthenticationBackendSecurity Token
0 likes · 10 min read
Secure One‑Time Token Design for Long‑Connection Services
Programmer DD
Programmer DD
Apr 18, 2018 · Information Security

Mastering JWT-Based User Authentication: An 8‑Step Guide

This article walks through an eight‑step JWT authentication flow, explaining how to securely transmit user IDs via cookies, verify tokens on each request, compare JWT with traditional session storage, and configure domain‑wide cookies for single sign‑on across subdomains.

AuthenticationCookieJWT
0 likes · 7 min read
Mastering JWT-Based User Authentication: An 8‑Step Guide
Java Backend Technology
Java Backend Technology
Jan 31, 2018 · Information Security

Why JWT Is Replacing Cookies for Stateless Web Authentication

This article explains HTTP's stateless nature, how cookies and server‑side sessions try to overcome it, the challenges of session sharing in clustered environments, and why JSON Web Tokens (JWT) provide a lightweight, secure, and scalable alternative for modern authentication.

AuthenticationJWTSession
0 likes · 14 min read
Why JWT Is Replacing Cookies for Stateless Web Authentication
Programmer DD
Programmer DD
Jan 14, 2018 · Backend Development

Integrating Spring Security with MyBatis for Database‑Based Login

This guide shows how to combine Spring Security and MyBatis to implement username‑password authentication backed by a MariaDB database, covering repository cloning, database setup, Maven execution, and a deep dive into the underlying authentication filter and provider classes with code examples.

AuthenticationJavaMyBatis
0 likes · 9 min read
Integrating Spring Security with MyBatis for Database‑Based Login
Programmer DD
Programmer DD
Jan 11, 2018 · Information Security

Master Spring Security: A Hands‑On Guide to @EnableWebSecurity and HttpSecurity Configuration

This tutorial walks you through setting up a Spring Boot project with Spring Security, explains the @EnableWebSecurity annotation, shows how to extend WebSecurityConfigurerAdapter, demonstrates overriding configure(AuthenticationManagerBuilder) and configure(HttpSecurity) methods with concrete code examples, and provides a concise reference table of common HttpSecurity methods.

AuthenticationBackend DevelopmentHttpSecurity
0 likes · 7 min read
Master Spring Security: A Hands‑On Guide to @EnableWebSecurity and HttpSecurity Configuration
DevOps
DevOps
Jan 7, 2018 · Information Security

Resolving Git Authentication Failures on Windows Using Credential Manager and SSH Keys

This guide explains two methods to overcome Git authentication errors on Windows—configuring Git Credential Manager for Basic authentication and generating SSH keys—to securely connect to TFS/VSTS Git repositories, including required commands, setup steps, and credential storage details.

AuthenticationCredential ManagerGit
0 likes · 6 min read
Resolving Git Authentication Failures on Windows Using Credential Manager and SSH Keys
ITPUB
ITPUB
Jan 3, 2018 · Information Security

How Ransomware Hijacks MySQL and What You Can Do to Stop It

The article explains how attackers compromise MySQL servers, create a WARNING table with ransom instructions demanding Bitcoin, and provides concrete SQL examples and four practical defense measures—including strong authentication, disabling public access, regular backups, and application hardening—to protect databases.

AuthenticationDatabase SecuritySQL injection
0 likes · 6 min read
How Ransomware Hijacks MySQL and What You Can Do to Stop It
Programmer DD
Programmer DD
Jan 2, 2018 · Information Security

Understanding Spring Security Architecture: Authentication, Authorization, and Filter Chains

This guide provides a deep dive into Spring Security's architecture, explaining how authentication and authorization are separated, how the AuthenticationManager and AccessDecisionManager work, how web filter chains are organized, and how to apply method‑level security and thread‑local context handling in Java applications.

AuthenticationAuthorizationFilter Chain
0 likes · 17 min read
Understanding Spring Security Architecture: Authentication, Authorization, and Filter Chains
dbaplus Community
dbaplus Community
Dec 3, 2017 · Databases

Why MySQL Connector/NET Randomly Fails Authentication and How to Fix It

An intermittent MySQL authentication error on Windows caused by the Connector/NET driver’s slow WMI OS‑info query triggers a server‑side timeout, and the article explains how packet analysis revealed the root cause and how caching or removing the WMI call resolves the issue.

AuthenticationConnector.NETDebugging
0 likes · 7 min read
Why MySQL Connector/NET Randomly Fails Authentication and How to Fix It
dbaplus Community
dbaplus Community
Sep 9, 2017 · Information Security

Why MongoDB Nodes Are Getting Hijacked and How to Secure Them

The article examines the widespread exposure of MongoDB instances on default ports, outlines how attackers hijack them, and provides concrete steps—including enabling authentication, configuring role‑based access, encrypting traffic, and limiting network exposure—to secure MongoDB deployments.

AuthenticationAuthorizationMongoDB
0 likes · 7 min read
Why MongoDB Nodes Are Getting Hijacked and How to Secure Them
UCloud Tech
UCloud Tech
Sep 5, 2017 · Information Security

How MongoDB Attacks Happen and What UCloud Does to Secure Your Data

The article explains why thousands of MongoDB instances are repeatedly compromised—due to password‑less logins and public exposure—details the inherent design flaws, and describes UCloud’s UDB MongoDB security measures such as mandatory authentication, VPC isolation, data backup, and performance‑friendly connection pooling.

AuthenticationDatabase SecurityMongoDB
0 likes · 6 min read
How MongoDB Attacks Happen and What UCloud Does to Secure Your Data
Architecture Digest
Architecture Digest
Sep 5, 2017 · Information Security

Security Authentication and Authorization Strategies for Microservice Architecture

This article examines the challenges of securing microservice architectures and compares various authentication and authorization approaches—including SSO, distributed sessions, client‑token schemes, JWT, and OAuth 2.0—to help developers choose suitable solutions for efficient and fine‑grained access control.

AuthenticationAuthorizationJWT
0 likes · 15 min read
Security Authentication and Authorization Strategies for Microservice Architecture
Hujiang Technology
Hujiang Technology
Aug 30, 2017 · Information Security

Design Principles and Security Considerations for User Account Systems

This article shares practical insights on building robust user account systems, covering the shift from usernames to phone numbers as unique identifiers, the drawbacks of passwords, the limited value of periodic password changes, the pitfalls of security questions, and best practices for token management, SMS/voice verification, captcha usage, and multi‑layered future security strategies.

AuthenticationPasswordlessSMS Verification
0 likes · 14 min read
Design Principles and Security Considerations for User Account Systems
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Aug 22, 2017 · Databases

Mastering MongoDB Connection, Authentication, and Query Optimization

This article explains common MongoDB connection problems, authentication mechanisms, read‑preference tuning, index types and creation, query‑plan analysis, pagination techniques, and array handling, offering practical tips to improve performance and reliability for developers.

AuthenticationConnection ManagementIndex Optimization
0 likes · 9 min read
Mastering MongoDB Connection, Authentication, and Query Optimization
Programmer DD
Programmer DD
Aug 11, 2017 · Backend Development

How @EnableResourceServer Configures OAuth2 Token Validation in Spring Security

This article breaks down the internal workflow of Spring Security’s @EnableResourceServer, explaining how OAuth2 tokens are extracted, validated, and turned into authentication objects through ResourceServerSecurityConfigurer, OAuth2AuthenticationProcessingFilter, OAuth2AuthenticationManager, and related components.

AuthenticationJavaOAuth2
0 likes · 11 min read
How @EnableResourceServer Configures OAuth2 Token Validation in Spring Security
Ctrip Technology
Ctrip Technology
Jun 5, 2017 · Information Security

Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0

This article recounts the development of Ctrip's graphical captcha system, describing its early .NET‑based implementation, the challenges encountered such as uniform difficulty, limited data collection, and poor user experience, and how successive redesigns—including multilingual support, adaptive difficulty, and slider‑plus‑character selection—balanced security and usability.

AuthenticationCaptchaUser experience
0 likes · 14 min read
Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0
Tongcheng Travel Technology Center
Tongcheng Travel Technology Center
Apr 14, 2017 · Information Security

Implementing a Lightweight User Authentication Mechanism for Hadoop at Tongcheng Travel

This article describes the design, implementation, and deployment of a custom Hadoop security solution that introduces username‑password authentication via RPC, integrates a new protobuf protocol, modifies NameNode behavior, and provides rollout tools to secure a large‑scale shared Hadoop cluster without service interruption.

AuthenticationHadoopKerberos
0 likes · 9 min read
Implementing a Lightweight User Authentication Mechanism for Hadoop at Tongcheng Travel
Efficient Ops
Efficient Ops
Mar 28, 2017 · Operations

How We Scaled Server Authentication with OpenLDAP: A Real‑World Operations Journey

This article walks through a vehicle‑networking company's four‑stage journey—selection, requirement analysis, implementation, and evolution—to replace fragmented SSH passwords with a centralized OpenLDAP authentication platform, covering cost decisions, deployment steps, security hardening, and management automation.

AuthenticationOpenLDAPOperations
0 likes · 13 min read
How We Scaled Server Authentication with OpenLDAP: A Real‑World Operations Journey
Efficient Ops
Efficient Ops
Jan 8, 2017 · Databases

Why MongoDB Instances Get Hacked and How to Secure Them on the Cloud

This article explains the root causes of unauthenticated public‑IP MongoDB breaches, outlines UCloud's built‑in security safeguards, and provides step‑by‑step guidance for hardening self‑hosted MongoDB and smoothly migrating it to a cloud‑managed service.

AuthenticationMongoDBSecurity
0 likes · 8 min read
Why MongoDB Instances Get Hacked and How to Secure Them on the Cloud
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Dec 17, 2016 · Information Security

How to Implement Robust Single Sign-On Across Multiple Domains

This article explores various single sign-on strategies—including shared Redis sessions, OpenID-based authentication, cookie-driven OpenID storage, and JSONP cross-domain solutions—detailing their architectures, limitations, and security considerations, and offers practical guidance for building scalable, secure SSO in multi-domain environments.

AuthenticationOpenIDSSO
0 likes · 9 min read
How to Implement Robust Single Sign-On Across Multiple Domains
Efficient Ops
Efficient Ops
Sep 6, 2016 · Information Security

How to Secure Microservice Access: Design Principles and Practical Solutions

This article examines the evolution from traditional monolithic access security to modern microservice architectures, outlines key design principles, compares four common authentication schemes, and demonstrates a Spring Cloud Security implementation using OAuth2 and UAA for fine‑grained, token‑based protection.

AuthenticationMicroservicesOAuth2
0 likes · 17 min read
How to Secure Microservice Access: Design Principles and Practical Solutions
Qunar Tech Salon
Qunar Tech Salon
Aug 4, 2016 · Fundamentals

The History and Evolution of URLs: Paths, Fragments, Queries, and Authentication

This article traces the origin and development of URLs from Tim Berners‑Lee's 1992 invention of HTTP, HTML and the universal document identifier, through the standardisation of syntax, query strings, fragments and authentication, highlighting key proposals, code examples and the ongoing debates about their purpose.

AuthenticationHTMLHTTP
0 likes · 17 min read
The History and Evolution of URLs: Paths, Fragments, Queries, and Authentication
High Availability Architecture
High Availability Architecture
Jul 1, 2016 · Backend Development

High‑Availability Design and Optimizations of Didi’s Passport Authentication Service

This article details Didi’s Passport authentication system architecture, describing how language migration, service decomposition, flexible ticket and SMS code designs, multi‑region active‑active deployment, an independent Argus access‑control layer, and interface splitting together achieve high availability and low latency under extreme traffic peaks.

AuthenticationGolangTicket
0 likes · 18 min read
High‑Availability Design and Optimizations of Didi’s Passport Authentication Service
WeChat Client Technology Team
WeChat Client Technology Team
May 10, 2016 · Information Security

How We Built mmtls: A High‑Performance, Low‑Latency Secure Protocol for WeChat

mmtls is a custom, lightweight secure communication protocol designed for WeChat that encrypts all client‑to‑server traffic, offering confidentiality, integrity, low latency, scalability, and forward secrecy by adapting TLS 1.3 concepts with optimized handshake, key‑exchange, record, and replay‑protection mechanisms.

AuthenticationLow latencyTLS
0 likes · 32 min read
How We Built mmtls: A High‑Performance, Low‑Latency Secure Protocol for WeChat
Efficient Ops
Efficient Ops
Jan 24, 2016 · Information Security

From 1.0 to 3.0: The Evolution and Architecture of Jumpserver Bastion Host

This article chronicles the development milestones, architectural design, and practical lessons learned while building Jumpserver—from its humble 1.0 prototype to the feature‑rich 3.0 release—offering deep insights for developers and security engineers interested in open‑source bastion solutions.

AuthenticationAuthorizationBastion Host
0 likes · 21 min read
From 1.0 to 3.0: The Evolution and Architecture of Jumpserver Bastion Host
Architects Research Society
Architects Research Society
Nov 18, 2015 · Backend Development

Playful Web Development, Part 1: Managing User Authentication with Play Framework and Scala

This tutorial walks you through building a starter authentication application using Play Framework, Scala, Silhouette, and MongoDB, covering email sign‑up, password reset, OAuth1 Twitter login, and user‑aware views, while explaining Play's reactive, asynchronous architecture for scalable backend development.

AuthenticationMongoDBPlay Framework
0 likes · 6 min read
Playful Web Development, Part 1: Managing User Authentication with Play Framework and Scala
21CTO
21CTO
Oct 28, 2015 · Information Security

How Single Sign-On Works: Trust Storage, Validation, and Secure Implementation

This article explains the concept of Single Sign-On (SSO), why it’s essential for large web platforms, the core steps of storing and validating trust, common cookie‑based approaches, their security drawbacks, and how server‑side solutions using distributed caches and digital signatures can provide a robust, cross‑domain authentication system.

AuthenticationCookieSSO
0 likes · 5 min read
How Single Sign-On Works: Trust Storage, Validation, and Secure Implementation
Architect
Architect
Oct 21, 2015 · Backend Development

Introduction to REST API Design and Security Practices

This article explains the fundamentals of REST APIs, outlines HTTP methods, recommends JSON payloads, and details authentication, authorization, URL filtering, encryption, rate limiting, error handling, and other security measures for building robust backend services.

AuthenticationAuthorizationBackend Development
0 likes · 10 min read
Introduction to REST API Design and Security Practices
21CTO
21CTO
Oct 15, 2015 · Information Security

How Single Sign-On (SSO) Boosts Enterprise Efficiency and Security

The article explains why enterprises need a unified Single Sign-On (SSO) system, detailing its benefits for user convenience, administrator workload reduction, security improvements, and integration standards, while comparing cookie‑ and session‑based implementations and illustrating the CAS open‑source solution.

AuthenticationCASEnterprise
0 likes · 15 min read
How Single Sign-On (SSO) Boosts Enterprise Efficiency and Security
dbaplus Community
dbaplus Community
Oct 12, 2015 · Databases

Essential PostgreSQL Security Checklist: Authentication, Encryption, Auditing and More

This comprehensive guide outlines practical PostgreSQL security measures—including hardened authentication, encrypted data transmission, column‑level encryption, strict permission controls, backup strategies, auditing, patch management, and resource monitoring—to help DBAs protect their databases from unauthorized access and attacks.

AuditingAuthenticationBackup
0 likes · 15 min read
Essential PostgreSQL Security Checklist: Authentication, Encryption, Auditing and More
Architect
Architect
Sep 7, 2015 · Information Security

Introducing dex: CoreOS Open Source OpenID Connect Identity Provider

CoreOS’s newly announced open‑source project dex is an OpenID Connect‑compliant identity provider that offers secure, standards‑based authentication across web, mobile, CLI and automation environments, with extensible connectors, robust security practices, and a real‑world deployment example at Tectonic.com.

AuthenticationDEXidentity provider
0 likes · 9 min read
Introducing dex: CoreOS Open Source OpenID Connect Identity Provider
MaGe Linux Operations
MaGe Linux Operations
Aug 17, 2015 · Fundamentals

How Email Works: From DNS Queries to Secure Mail Delivery

This comprehensive guide explains the architecture and workflow of email systems, covering DNS MX record lookup, the roles of MUA, MTA, MDA, MRA, authentication mechanisms, encryption, and spam/virus filtering, providing operators with essential knowledge to manage and secure mail services.

AuthenticationDNSEmail
0 likes · 17 min read
How Email Works: From DNS Queries to Secure Mail Delivery