Tagged articles
225 articles
Page 1 of 3
Architect's Guide
Architect's Guide
Mar 30, 2026 · Backend Development

Mastering Dynamic Permission Checks in Spring Boot with SpEL

This guide explains how to replace static custom‑annotation permission checks in Spring Boot with flexible SpEL expressions, covering annotation design, aspect definition, expression parsing, context setup, and practical usage examples for various access scenarios.

AuthorizationCustom AnnotationJava
0 likes · 9 min read
Mastering Dynamic Permission Checks in Spring Boot with SpEL
Java Tech Enthusiast
Java Tech Enthusiast
Mar 6, 2026 · Backend Development

Simplify Spring Boot Authentication with Sa-Token: A Complete Guide

This article introduces Sa-Token, a lightweight Java authentication framework, explains why it outperforms Spring Security, shows how to configure it in Spring Boot, and provides multiple code examples—including login, logout, role and permission checks, global interceptors, front‑end token handling, and Redis storage.

AuthenticationAuthorizationBackend
0 likes · 7 min read
Simplify Spring Boot Authentication with Sa-Token: A Complete Guide
Tech Freedom Circle
Tech Freedom Circle
Dec 31, 2025 · Information Security

Unified SSO via Gateway: Multi‑App Auth & Authz and JWT vs Auth vs Authz

This article walks through a complete design and implementation of a unified single sign‑on system using OAuth2.0 authorization‑code flow, Spring Cloud Gateway, JWT, Redis, and Nacos, comparing JWT, authentication, and authorization while presenting performance metrics, security considerations, and interview‑ready answers.

AuthenticationAuthorizationJWT
0 likes · 59 min read
Unified SSO via Gateway: Multi‑App Auth & Authz and JWT vs Auth vs Authz
Lobster Programming
Lobster Programming
Dec 23, 2025 · Information Security

Understanding the Difference Between SSO and OAuth2.0: Authentication vs Authorization

SSO (Single Sign‑On) and OAuth2.0 are both widely used identity frameworks; SSO handles user authentication across multiple applications with a single login, while OAuth2.0 is an authorization protocol that lets users grant third‑party apps limited access to resources without sharing passwords.

AuthenticationAuthorizationIdentity Management
0 likes · 6 min read
Understanding the Difference Between SSO and OAuth2.0: Authentication vs Authorization
Top Architect
Top Architect
Nov 11, 2025 · Information Security

Mastering Authentication & Authorization: Cookies, Sessions, Tokens, and JWT Explained

This comprehensive guide explores the fundamentals of authentication and authorization, detailing how credentials, cookies, and sessions work together, and compares traditional session-based approaches with modern token-based solutions such as JWT, covering their mechanisms, advantages, drawbacks, and best practices for secure, scalable web applications.

AuthenticationAuthorizationJWT
0 likes · 38 min read
Mastering Authentication & Authorization: Cookies, Sessions, Tokens, and JWT Explained
Open Source Tech Hub
Open Source Tech Hub
Nov 11, 2025 · Information Security

Understanding Authentication vs Authorization: From Basics to JWT & Casbin

This article explains the fundamental differences between authentication and authorization, outlines various authentication factors, details the JWT signing process, and introduces Casbin as a powerful open‑source authorization framework, helping developers secure API access effectively.

APIAuthenticationAuthorization
0 likes · 8 min read
Understanding Authentication vs Authorization: From Basics to JWT & Casbin
Architect's Guide
Architect's Guide
Nov 9, 2025 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, introduces JWT structure and usage, discusses common security concerns, and outlines practical solutions for distributed systems and modern web applications.

AuthenticationAuthorizationCookie
0 likes · 36 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT
Raymond Ops
Raymond Ops
Nov 7, 2025 · Cloud Native

Master Kubernetes RBAC in One Article: A Complete Overview

This guide explains Kubernetes RBAC, covering authentication account types, authentication methods, authorization strategies, and detailed examples of Role, ClusterRole, RoleBinding, and ClusterRoleBinding configurations with code snippets and practical comparisons for secure cluster.

AuthorizationClusterRoleKubernetes
0 likes · 21 min read
Master Kubernetes RBAC in One Article: A Complete Overview
Selected Java Interview Questions
Selected Java Interview Questions
Oct 24, 2025 · Backend Development

How to Secure a Spring Boot Application with Spring Security and JWT

This step‑by‑step guide shows how to integrate Spring Security into a Spring Boot project, configure Maven dependencies, define User, Role and Permission entities, set up MyBatis mappers, implement JWT generation and validation, and build the service, controller, and configuration layers for a complete authentication system.

AuthenticationAuthorizationBackend Development
0 likes · 28 min read
How to Secure a Spring Boot Application with Spring Security and JWT
Raymond Ops
Raymond Ops
Oct 20, 2025 · Information Security

Mastering Kubernetes Security: Authentication, Authorization, and Admission Control Explained

This article provides a comprehensive guide to Kubernetes security mechanisms, covering the three core layers of authentication, authorization, and admission control, various authentication methods, RBAC policies, service accounts, certificates, kubeconfig setup, and practical examples for managing access within a cluster.

AdmissionControlAuthenticationAuthorization
0 likes · 26 min read
Mastering Kubernetes Security: Authentication, Authorization, and Admission Control Explained
Architect's Guide
Architect's Guide
Oct 12, 2025 · Information Security

Why Sa-Token Is the Most Feature‑Rich Java Authentication Framework You Need

Sa-Token is a lightweight, open‑source Java authentication framework that offers zero‑configuration login, permission checks, session handling, single sign‑on, and extensive features, with simple one‑line APIs and high extensibility for backend and security development.

AuthenticationAuthorizationBackend Development
0 likes · 6 min read
Why Sa-Token Is the Most Feature‑Rich Java Authentication Framework You Need
Java Captain
Java Captain
Aug 20, 2025 · Information Security

Build a Secure Spring Boot App in Minutes with Spring Security

This tutorial walks you through adding Spring Security to a Spring Boot project, from adding the starter dependency and creating a simple controller to observing the default login page, understanding the auto‑generated password mechanism, and customizing usernames and passwords for production use.

AuthenticationAuthorizationJava
0 likes · 9 min read
Build a Secure Spring Boot App in Minutes with Spring Security
Open Source Tech Hub
Open Source Tech Hub
Aug 5, 2025 · Information Security

Mastering Fine-Grained Access Control in PHP with Casbin

This article explains how PHP‑Casbin implements the PERM model to provide flexible, lightweight, and multi‑model access control for PHP applications, covering its architecture, supported ACL/RBAC/ABAC models, configuration syntax, cross‑language ecosystem, storage options, framework integrations, and practical use cases.

AuthorizationBackendCasbin
0 likes · 6 min read
Mastering Fine-Grained Access Control in PHP with Casbin
Code Ape Tech Column
Code Ape Tech Column
Jul 22, 2025 · Information Security

Mastering Access Control: From ACL to RBAC and Beyond

This article explains the fundamentals and practical applications of major permission models—including ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and how to implement them effectively in real-world systems.

AuthorizationRBACaccess control
0 likes · 15 min read
Mastering Access Control: From ACL to RBAC and Beyond
Architect's Guide
Architect's Guide
Jun 23, 2025 · Information Security

Discover Sa-Token: The Most Feature‑Rich Java Authentication Framework

Sa-Token is a lightweight Java permission authentication framework that offers zero‑configuration login, comprehensive permission checks, session management, single sign‑on, OAuth2.0 support, distributed sessions, token customization, and many advanced features, with simple one‑line API calls illustrated by clear code examples.

AuthenticationAuthorizationFramework
0 likes · 7 min read
Discover Sa-Token: The Most Feature‑Rich Java Authentication Framework
php Courses
php Courses
Jun 19, 2025 · Backend Development

Boost Your PHP Projects: Essential Features and Performance Optimizations

This article outlines key PHP functionalities such as user authentication, database optimization, file handling, frontend‑backend interaction, and error logging, and provides practical tips to improve security, performance, and overall quality of PHP web applications.

AuthenticationAuthorizationDatabase Optimization
0 likes · 6 min read
Boost Your PHP Projects: Essential Features and Performance Optimizations
MaGe Linux Operations
MaGe Linux Operations
Jun 8, 2025 · Cloud Native

Master Kubernetes RBAC: A Complete Guide to Roles, Bindings, and Permissions

This comprehensive article explains Kubernetes security by detailing authentication types, authentication methods (HTTP Basic, Token, and HTTPS), the RBAC authorization model, and the definitions and practical examples of Role, ClusterRole, RoleBinding, and ClusterRoleBinding, helping readers implement fine‑grained access control in their clusters.

AuthenticationAuthorizationCloud Native
0 likes · 23 min read
Master Kubernetes RBAC: A Complete Guide to Roles, Bindings, and Permissions
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 6, 2025 · Backend Development

Secure Spring Boot 3 APIs: 5 Methods with Filters, Interceptors, AOP, OAuth2

This article presents five practical approaches to protect Spring Boot 3 API endpoints—including Filter, Interceptor, AOP combined with Filter, Spring Security, and OAuth2 integration—providing code examples, configuration steps, and screenshots to demonstrate authentication, authorization, and token handling for secure access control.

API SecurityAuthenticationAuthorization
0 likes · 11 min read
Secure Spring Boot 3 APIs: 5 Methods with Filters, Interceptors, AOP, OAuth2
Alibaba Cloud Native
Alibaba Cloud Native
Jun 5, 2025 · Cloud Native

Understanding MCP Auth: OAuth 2.1 Integration and Bearer Authentication for Function Compute

This article explains how the MCP protocol adopts OAuth 2.1, Authorization Server Metadata (RFC 8414), Dynamic Client Registration (RFC 7591) and Protected Resource Metadata (RFC 9728) to provide authentication for MCP services, and shows step‑by‑step how to deploy an MCP server with Bearer authentication on Function Compute, including supergateway configuration.

AuthorizationBearer AuthenticationFunction Compute
0 likes · 15 min read
Understanding MCP Auth: OAuth 2.1 Integration and Bearer Authentication for Function Compute
Java Captain
Java Captain
Jun 3, 2025 · Information Security

Integrating Spring Security with Spring Boot for JWT Authentication and Authorization

This article demonstrates how to integrate Spring Security into a Spring Boot application, configure JWT‑based authentication, implement custom AES encryption, define user and role entities, set up service and controller layers, and configure security, filter, and CORS settings to achieve secure login and permission management.

AuthenticationAuthorizationJWT
0 likes · 19 min read
Integrating Spring Security with Spring Boot for JWT Authentication and Authorization
MaGe Linux Operations
MaGe Linux Operations
May 15, 2025 · Cloud Native

Kubernetes Security Deep Dive: Auth, AuthZ, and Admission Control

This article explains Kubernetes' comprehensive security architecture, detailing the three critical gates—authentication, authorization, and admission control—along with token, basic, and certificate methods, RBAC policies, service accounts, kubeconfig setup, and practical examples for managing user permissions within clusters.

AdmissionControlAuthenticationAuthorization
0 likes · 20 min read
Kubernetes Security Deep Dive: Auth, AuthZ, and Admission Control
Raymond Ops
Raymond Ops
Apr 24, 2025 · Cloud Native

Mastering Istio Security: Complete Guide to Mutual TLS, Authentication, and Authorization

This article explains how Istio secures micro‑service architectures by providing strong identity, fine‑grained access policies, transparent TLS encryption, and comprehensive AAA (authentication, authorization, audit) mechanisms, covering high‑level architecture, certificate management, peer and request authentication, and authorization policy design.

AuthenticationAuthorizationIstio
0 likes · 23 min read
Mastering Istio Security: Complete Guide to Mutual TLS, Authentication, and Authorization
Code Ape Tech Column
Code Ape Tech Column
Apr 14, 2025 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical extensions such as role hierarchies, constraints, and real‑world system design considerations for user, role, and permission management.

ACLAuthorizationPermissions
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Top Architect
Top Architect
Mar 16, 2025 · Information Security

OAuth 2.0 Overview and Spring Boot Implementation Guide

This article introduces OAuth 2.0 concepts, roles, and grant types, then provides a step‑by‑step Spring Boot implementation with configuration classes, dependency setup, resource server configuration, test controller code, and demonstrates how to obtain and use access tokens, followed by a series of promotional offers.

AuthorizationOAuth2Security
0 likes · 14 min read
OAuth 2.0 Overview and Spring Boot Implementation Guide
Architecture Digest
Architecture Digest
Jan 22, 2025 · Information Security

Design and Evolution of Permission Management Models (RBAC)

This article explains why permission management is essential, describes various permission models from basic data‑view and edit rights to hierarchical menu and button controls, introduces role‑based access control (RBAC) and its extensions such as role inheritance, constraints, user groups, organizations and positions, and finally presents ideal RBAC table designs for large‑scale systems.

AuthorizationRBACRole-Based Access
0 likes · 14 min read
Design and Evolution of Permission Management Models (RBAC)
Top Architect
Top Architect
Dec 26, 2024 · Information Security

OAuth2.0 Overview and Spring Boot Implementation Guide

This article introduces OAuth2.0 concepts, outlines its roles and grant types, and provides a step‑by‑step Spring Boot implementation of an authorization server, resource server, and test client, followed by test results and promotional information.

AuthorizationJavaSpring Boot
0 likes · 12 min read
OAuth2.0 Overview and Spring Boot Implementation Guide
Top Architect
Top Architect
Dec 22, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article provides a comprehensive overview of OAuth2.0, explaining its core concepts, the roles of resource owner, client, authorization server, and resource server, illustrating the full authorization flow with diagrams, clarifying related terminology such as authentication, delegation, and roles, and finally noting additional promotional material.

AuthorizationOAuth2.0SSO
0 likes · 14 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Architect
Architect
Dec 6, 2024 · Backend Development

Microservice Permission Design and Implementation with Shiro in Spring Boot

This article presents a comprehensive guide to designing and implementing fine‑grained permission control for microservices using Apache Shiro, covering the architectural design, shared session handling with Redis, custom cache and session managers, realm implementation, and practical testing across user and video services.

AuthorizationSession ManagementShiro
0 likes · 24 min read
Microservice Permission Design and Implementation with Shiro in Spring Boot
37 Interactive Technology Team
37 Interactive Technology Team
Nov 27, 2024 · Cloud Native

Kubernetes RBAC Permission Authentication: Concepts, Components, and Production Scenarios

Kubernetes RBAC authenticates users and programs by verifying who can perform which verbs on which resources, using ServiceAccounts, Roles, RoleBindings, ClusterRoles and ClusterRoleBindings, and the article demonstrates these concepts through production scenarios such as a TCF framework pod communication setup and full‑admin access via token‑based kubeconfig.

AuthorizationKubernetesRBAC
0 likes · 8 min read
Kubernetes RBAC Permission Authentication: Concepts, Components, and Production Scenarios
37 Interactive Technology Team
37 Interactive Technology Team
Nov 11, 2024 · Information Security

Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)

JSON Web Token (JWT) is a compact, self‑contained, stateless token that encodes header, payload, and signature in Base64URL, enabling secure, signature‑verified authentication without server‑side session storage, simplifying scaling, supporting cross‑domain use, while offering advantages like lightweight extensibility and drawbacks such as revocation difficulty and secret‑key reliance.

AuthenticationAuthorizationJSON
0 likes · 16 min read
Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)
Java Architecture Stack
Java Architecture Stack
Nov 6, 2024 · Information Security

Mastering Apache Shiro: Core Concepts, Real‑World Usage, and JWT Microservice Integration

This article explains Apache Shiro’s fundamental components—Subject, SecurityManager, Realm, Session, authentication, authorization, and cryptography—then walks through a complete configuration example, a custom Realm, JWT integration, and a Spring Boot microservice scenario to illustrate secure, stateless authentication and fine‑grained permission control.

Apache ShiroAuthenticationAuthorization
0 likes · 13 min read
Mastering Apache Shiro: Core Concepts, Real‑World Usage, and JWT Microservice Integration
Architect
Architect
Oct 12, 2024 · Information Security

Understanding ACL, ABAC, and RBAC: Choosing the Right Access Control Model

This article introduces three common permission models—ACL, ABAC, and RBAC—explaining their core concepts, how they manage user access through objects, attributes, or roles, and discusses the strengths and limitations of each approach for secure system design.

ABACACLAuthorization
0 likes · 8 min read
Understanding ACL, ABAC, and RBAC: Choosing the Right Access Control Model
php Courses
php Courses
Aug 27, 2024 · Backend Development

Laravel Policy-Based Authorization: Creation, Registration, and Usage Guide

This article explains how Laravel's policy-based authorization works, covering policy creation, registration, usage in controllers and Blade, custom methods, response handling, guest user support, and testing, with full code examples for implementing secure and maintainable access control.

AuthorizationGateLaravel
0 likes · 5 min read
Laravel Policy-Based Authorization: Creation, Registration, and Usage Guide
Su San Talks Tech
Su San Talks Tech
Aug 19, 2024 · Information Security

Mastering RBAC with Spring Security and JWT: A Complete Guide

This tutorial walks through RBAC fundamentals, model classifications (RBAC0‑3), permission and user‑group concepts, then demonstrates practical Spring Security setups including in‑memory authentication, JWT integration, JSON‑based login, password encryption with BCrypt, and database‑backed authentication, providing complete code examples.

AuthenticationAuthorizationJWT
0 likes · 19 min read
Mastering RBAC with Spring Security and JWT: A Complete Guide
Top Architect
Top Architect
Aug 11, 2024 · Information Security

Deep Dive into Spring Security Architecture and Implementation Principles

This article provides an in‑depth analysis of Spring Security 6.x architecture, explaining its filter‑chain design, authentication and authorization mechanisms, key components such as DelegatingFilterProxy, FilterChainProxy, SecurityFilterChain, and offers code examples and practical guidance for developers.

AuthenticationAuthorizationJava
0 likes · 31 min read
Deep Dive into Spring Security Architecture and Implementation Principles
Open Source Tech Hub
Open Source Tech Hub
Aug 5, 2024 · Backend Development

Secure Your PHP Code with Zephir: Build a Custom Encryption Extension

Learn how to protect PHP source code by creating a custom Zephir‑based encryption extension, covering repository setup, directory structure, licensing logic, abstract and live modules, compilation steps, php.ini configuration, and testing with example authorization codes.

AuthorizationBackend DevelopmentCode Encryption
0 likes · 9 min read
Secure Your PHP Code with Zephir: Build a Custom Encryption Extension
Architect's Guide
Architect's Guide
Jul 27, 2024 · Information Security

Understanding OAuth 2.0: Principles, Architecture, and Implementation

This article explains the OAuth 2.0 authorization framework, its core concepts, architecture, key roles, and implementation patterns for web, user‑agent, and native applications, helping readers grasp how delegated access works without sharing user credentials.

AuthenticationAuthorizationOAuth2
0 likes · 9 min read
Understanding OAuth 2.0: Principles, Architecture, and Implementation
IT Architects Alliance
IT Architects Alliance
Jul 26, 2024 · Information Security

Unveiling Spring Security 6: Architecture, Filters, and Authentication Deep Dive

This article provides a comprehensive analysis of Spring Security 6's architecture, explaining how the framework uses a chain of servlet Filters, the DelegatingFilterProxy, and the SecurityFilterChain to implement authentication, authorization, and protection against common attacks, while also offering practical debugging tips and configuration guidance.

AuthenticationAuthorizationFilter Chain
0 likes · 32 min read
Unveiling Spring Security 6: Architecture, Filters, and Authentication Deep Dive
Eric Tech Circle
Eric Tech Circle
Jul 24, 2024 · Backend Development

Designing Secure Microservice Authentication with Spring Boot 3 and OAuth2

This article explains the key changes in Spring Boot 3, outlines the new OAuth2 components, and provides a detailed design for secure microservice authentication and authorization using Spring Authorization Server, JWT, API Gateway, and client applications, complete with architecture diagrams and implementation steps.

AuthenticationAuthorizationBackend
0 likes · 9 min read
Designing Secure Microservice Authentication with Spring Boot 3 and OAuth2
Top Architect
Top Architect
Jul 13, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the OAuth2.0 authorization protocol, distinguishes it from single sign‑on, describes its core entities and step‑by‑step flow, and outlines how web servers, user agents, and native applications interact to securely obtain access tokens for protected resources.

AuthenticationAuthorizationBackend Development
0 likes · 12 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Top Architect
Top Architect
Jul 5, 2024 · Information Security

Deep Dive into Spring Security Architecture: Authentication, Authorization, and Filter Chains

This article explains the core architecture of Spring Security 6.x, detailing how a chain of servlet Filters implements authentication and authorization, the role of DelegatingFilterProxy, SecurityFilterChain, and the extensible components such as AuthenticationManager, UserDetailsService, and PasswordEncoder.

AuthenticationAuthorizationJava
0 likes · 31 min read
Deep Dive into Spring Security Architecture: Authentication, Authorization, and Filter Chains
macrozheng
macrozheng
Jul 4, 2024 · Information Security

Mastering Access Control: 5 Core Permission Models and Practical RBAC Design

This article explains the fundamentals of access control by reviewing five major permission models—ACL, DAC, MAC, ABAC, and RBAC—then dives into RBAC extensions and practical guidelines for designing user, role, and permission management in real‑world systems, covering menu, operation, and data-level controls.

AuthorizationRBACSecurity Architecture
0 likes · 15 min read
Mastering Access Control: 5 Core Permission Models and Practical RBAC Design
Architect
Architect
Jul 1, 2024 · Information Security

Spring Security 6.1 Deep Dive: Architecture, Filters, and Authentication Explained

This article provides a comprehensive analysis of Spring Security 6.1, covering its core architecture, the role of FilterChainProxy, detailed authentication and authorization flows, key interfaces such as SecurityFilterChain, AuthenticationManager, and practical code examples to help developers understand and debug the framework.

AuthenticationAuthorizationFilterChain
0 likes · 34 min read
Spring Security 6.1 Deep Dive: Architecture, Filters, and Authentication Explained
Su San Talks Tech
Su San Talks Tech
Jun 3, 2024 · Information Security

Mastering Access Control: 5 Core Permission Models Explained

This article introduces the five mainstream access‑control models—ACL, DAC, MAC, ABAC, and RBAC—explaining their principles, real‑world examples, drawbacks, and how RBAC can be extended and applied in practical user, role, and permission management systems.

AuthorizationRBACSecurity
0 likes · 14 min read
Mastering Access Control: 5 Core Permission Models Explained
Data Thinking Notes
Data Thinking Notes
May 16, 2024 · Information Security

How a Data Security Governance Platform Secures the Full Data Lifecycle

This article explains how a data security governance platform protects data across its entire lifecycle—from warehouse construction and collection to application—by implementing fine‑grained permission controls, encryption, masking, authentication, and comprehensive auditing, while addressing scalability, high availability, and regulatory compliance challenges.

AuthenticationAuthorizationBig Data
0 likes · 13 min read
How a Data Security Governance Platform Secures the Full Data Lifecycle
Ops Development & AI Practice
Ops Development & AI Practice
May 13, 2024 · Fundamentals

Master Python Decorators: From Basics to Advanced Use Cases

This article explains Python decorators, covering their definition as higher‑order functions, basic syntax, practical examples such as logging, authorization, caching, and nested decorators, and demonstrates how they enhance code modularity, readability, and reusability without altering original functions.

Authorizationcachingcode-reuse
0 likes · 5 min read
Master Python Decorators: From Basics to Advanced Use Cases
php Courses
php Courses
May 9, 2024 · Backend Development

Implementing User Authentication and Authorization in PHP

This article explains how to implement user authentication and role‑based authorization in PHP, covering password hashing with password_hash/password_verify, database queries for credential verification, and conditional logic for granting access based on user roles, with sample code snippets illustrating each step.

AuthenticationAuthorizationBackend
0 likes · 4 min read
Implementing User Authentication and Authorization in PHP
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 2, 2024 · Information Security

Master Spring Security: From Basic Auth to Custom Login Pages

This article walks through Spring Security fundamentals, covering authentication mechanisms, authorization configuration, dependency setup, custom user details with database integration, and how to replace the default login page with a custom one, all illustrated with code snippets and screenshots.

AuthenticationAuthorizationSpring Boot
0 likes · 8 min read
Master Spring Security: From Basic Auth to Custom Login Pages
Alibaba Cloud Native
Alibaba Cloud Native
Apr 18, 2024 · Cloud Native

What’s New in RocketMQ ACL 2.0? A Deep Dive into Features, Architecture, and Configuration

This article explains the motivations behind RocketMQ ACL 2.0, outlines its six major enhancements—including fine‑grained API permissions, flexible matching modes, and cluster‑wide access control—details the RBAC/ABAC model, authentication and authorization workflows, configuration examples, command‑line usage, and migration strategies, and discusses future planning for the access control system.

ACLAuthenticationAuthorization
0 likes · 24 min read
What’s New in RocketMQ ACL 2.0? A Deep Dive into Features, Architecture, and Configuration
Selected Java Interview Questions
Selected Java Interview Questions
Apr 2, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including classic RBAC, role inheritance, constrained RBAC, and discusses practical extensions such as user groups, organizations, positions, and provides database schema designs for both standard and ideal RBAC implementations.

AuthorizationRBACRole-Based Access Control
0 likes · 19 min read
Understanding Permission Management and RBAC Models
Cloud Native Technology Community
Cloud Native Technology Community
Mar 19, 2024 · Cloud Native

Quick Preview of Exciting Changes in Kubernetes v1.30

Kubernetes v1.30 introduces a range of exciting enhancements—including structured DRA parameters, revamped swap support, beta user‑namespace pods, structured authorization config, container‑resource‑based autoscaling, and CEL‑enabled admission control—each aimed at improving flexibility, security, and operational stability for cloud‑native workloads.

AuthorizationDynamic Resource AllocationKubernetes
0 likes · 11 min read
Quick Preview of Exciting Changes in Kubernetes v1.30
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Feb 2, 2024 · Backend Development

Master Spring Security 5.7+ Config: From WebSecurityConfigurerAdapter to SecurityFilterChain

This guide explains how Spring Security configuration changed after version 5.7, covering the shift from WebSecurityConfigurerAdapter to SecurityFilterChain beans, multiple filter chain setup, in‑memory user definitions, custom authorization decisions, and shared authentication components, with full code examples.

AuthenticationAuthorizationJava
0 likes · 7 min read
Master Spring Security 5.7+ Config: From WebSecurityConfigurerAdapter to SecurityFilterChain
FunTester
FunTester
Jan 29, 2024 · Information Security

Fundamentals of API Security: Principles, Practices, and Lifecycle Management

This article provides a comprehensive overview of API security, covering authentication and authorization, privacy and encryption, input validation, detection, rate limiting, logging, secure coding, vulnerability management, lifecycle phases, and the importance of education and training to protect modern software ecosystems.

API SecurityAuthenticationAuthorization
0 likes · 14 min read
Fundamentals of API Security: Principles, Practices, and Lifecycle Management
Code Ape Tech Column
Code Ape Tech Column
Jan 23, 2024 · Information Security

Implementing Sa-Token Authentication and Authorization in Spring Cloud Gateway

This article demonstrates how to replace heavyweight Spring Security with the lightweight Sa-Token framework by configuring token generation, session management, role and permission retrieval, and global gateway filters in a Spring Cloud micro‑service architecture, including complete code examples and deployment tips.

AuthenticationAuthorizationJava
0 likes · 20 min read
Implementing Sa-Token Authentication and Authorization in Spring Cloud Gateway
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jan 2, 2024 · Information Security

Master Spring Security: Custom Configurations, Filters, and Advanced Features

An in‑depth Spring Security guide covering custom configurations, authentication providers, user‑details services, path‑based authorization, role hierarchies, exception handling, custom filters, multiple filter chains, method security, internationalization, and session management, complete with practical code examples for Spring Boot 2.7.

AuthenticationAuthorizationJava
0 likes · 10 min read
Master Spring Security: Custom Configurations, Filters, and Advanced Features
Top Architect
Top Architect
Nov 22, 2023 · Information Security

Designing Microservice Permission Control with Shiro and Redis Session Sharing

This article explains how to design microservice permission control using Apache Shiro, sharing session data via Redis, outlines failed approaches, presents a workable solution with custom cache and session managers, and provides complete code examples for realms, configuration, and login flow.

AuthorizationJavaShiro
0 likes · 24 min read
Designing Microservice Permission Control with Shiro and Redis Session Sharing
Java High-Performance Architecture
Java High-Performance Architecture
Nov 21, 2023 · Information Security

Master Spring Security: Quick Start, JWT Authentication, and RBAC Authorization

This comprehensive guide walks you through setting up Spring Security in a Spring Boot project, configuring password encoding, implementing JWT-based authentication, building custom login and logout endpoints, managing user details with MyBatis Plus, and applying role‑based access control with custom permission handlers, all illustrated with complete code examples.

AuthenticationAuthorizationJWT
0 likes · 40 min read
Master Spring Security: Quick Start, JWT Authentication, and RBAC Authorization
Architecture Digest
Architecture Digest
Oct 25, 2023 · Information Security

RBAC Permission Analysis and Spring Security Implementation Guide (including JWT and JSON Login)

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model variants, permission concepts, and user‑group usage, then demonstrates practical Spring Security setups ranging from simple in‑memory authentication to JWT integration, JSON‑based login, password encryption, and database‑backed authentication with full code examples.

AuthorizationJWTJava
0 likes · 18 min read
RBAC Permission Analysis and Spring Security Implementation Guide (including JWT and JSON Login)
Su San Talks Tech
Su San Talks Tech
Aug 15, 2023 · Information Security

Master Spring Security & JWT: Build Secure Authentication in Spring Boot

This tutorial explains how to integrate Spring Security with JWT in a Spring Boot application, covering authentication and authorization concepts, filter chain principles, project setup, dependency configuration, security configuration classes, custom token filters, and the complete request‑authentication flow.

AuthenticationAuthorizationJWT
0 likes · 15 min read
Master Spring Security & JWT: Build Secure Authentication in Spring Boot
Code Ape Tech Column
Code Ape Tech Column
Aug 7, 2023 · Information Security

Understanding Spring Security Permission Annotations and Their Practical Use in a Microservice System

This article explains the eight built‑in Spring Security permission annotations, how to enable them with @EnableGlobalMethodSecurity, provides Java code examples for each annotation, and demonstrates their practical use in the Codeape Chronic Disease Cloud Management System for fine‑grained microservice authorization.

AuthorizationBackend DevelopmentJava
0 likes · 9 min read
Understanding Spring Security Permission Annotations and Their Practical Use in a Microservice System
Java Architecture Diary
Java Architecture Diary
Jul 25, 2023 · Backend Development

Fixing Spring Boot Startup Errors After CVE‑2023‑34035 Upgrade

When upgrading Spring Boot to patch CVE‑2023‑34034 and CVE‑2023‑34035, applications using Spring Security may encounter a startup error indicating ambiguous pattern detection, which can be resolved by upgrading to patched versions and adjusting requestMatchers to use MvcRequestMatcher or AntPathRequestMatcher as appropriate.

AuthorizationCVEJava
0 likes · 4 min read
Fixing Spring Boot Startup Errors After CVE‑2023‑34035 Upgrade
Top Architect
Top Architect
Jul 20, 2023 · Backend Development

Designing Microservice Permission Architecture with Shiro and Redis

This article explains how to design and implement a microservice permission system using Apache Shiro, Spring Boot, Dubbo, and Redis, covering challenges of integrating Shiro with gateways, shared session management, custom Cache and SessionDAO implementations, and provides complete code examples and configuration details.

AuthorizationJavaShiro
0 likes · 26 min read
Designing Microservice Permission Architecture with Shiro and Redis
Architect's Guide
Architect's Guide
Jul 2, 2023 · Information Security

Authentication, Authorization, Credentials, Cookies, Sessions, Tokens and JWT Overview

This article provides a comprehensive overview of authentication and authorization concepts, explains the roles of credentials, compares cookies and sessions, discusses session scaling strategies, introduces token‑based authentication and JWT structure, and highlights security considerations and common encryption algorithms.

AuthorizationJWTSessions
0 likes · 32 min read
Authentication, Authorization, Credentials, Cookies, Sessions, Tokens and JWT Overview
php Courses
php Courses
Jun 27, 2023 · Information Security

Introducing Cedar: Amazon’s Open‑Source Policy Language for Access Control

Cedar is an open‑source, domain‑specific language from Amazon that lets developers define, analyze, and enforce access‑control policies outside application code, supporting RBAC and ABAC, with SDKs for Rust and Java and integration into Amazon Verified Permissions and AWS Verified Access.

AuthorizationCedarJava
0 likes · 5 min read
Introducing Cedar: Amazon’s Open‑Source Policy Language for Access Control
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2023 · Backend Development

Spring Security Overview: Core Features, Principles, Access Control Methods, Role vs Authority, Password Encryption, and Username/Password Authentication Flow

This article explains Spring Security's core functions, underlying filter‑based mechanism, various request‑access control methods, the distinction between hasRole and hasAuthority, how to encrypt passwords with BCryptPasswordEncoder, and the complete username‑password authentication process for securing backend applications.

AuthenticationAuthorizationBackend Security
0 likes · 10 min read
Spring Security Overview: Core Features, Principles, Access Control Methods, Role vs Authority, Password Encryption, and Username/Password Authentication Flow
Su San Talks Tech
Su San Talks Tech
Jun 14, 2023 · Backend Development

Delegating Authentication to Microservices with Custom Spring Annotations

This article explains how to move authentication from the gateway to individual Spring Cloud microservices by defining three custom annotations and an AOP aspect, while also covering Feign‑based calls and providing practical code examples for implementation.

AuthenticationAuthorizationCustom Annotations
0 likes · 9 min read
Delegating Authentication to Microservices with Custom Spring Annotations
Code Ape Tech Column
Code Ape Tech Column
May 24, 2023 · Backend Development

Sa-Token: A Lightweight Java Authentication and Authorization Framework

This article introduces Sa-Token, a lightweight Java permission authentication framework, explains why it was chosen over Spring Security and Shiro, details its core login and permission APIs, demonstrates integration with Spring Boot and WebFlux, and lists its extensive feature set for modern backend development.

AuthenticationAuthorizationBackend
0 likes · 21 min read
Sa-Token: A Lightweight Java Authentication and Authorization Framework
Java Architect Essentials
Java Architect Essentials
May 13, 2023 · Information Security

Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration

This article introduces the lightweight Sa-Token Java framework, explains its login and permission authentication mechanisms, demonstrates essential API usage with code examples, and provides step‑by‑step integration guides for SpringBoot and WebFlux, covering configuration, session handling, role checks, wildcard permissions, and global exception handling.

AuthenticationAuthorizationSa-Token
0 likes · 23 min read
Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration
Programmer DD
Programmer DD
Apr 24, 2023 · Information Security

Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works

This article explains the concepts, workflows, and key differences between Single Sign‑On (SSO) and OAuth2.0, illustrating how token‑based authentication replaces passwords, detailing typical CAS‑based SSO steps, OAuth2.0 authorization‑code flow, and clarifying related terminology and grant types.

AuthorizationCASOAuth2.0
0 likes · 9 min read
Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works
Java High-Performance Architecture
Java High-Performance Architecture
Apr 5, 2023 · Backend Development

Master Spring Security: JWT, Custom Handlers, and Dynamic Permissions

This article provides a comprehensive guide to configuring Spring Security in a Java backend, covering Maven dependencies, global security settings, JWT token parsing, custom authentication providers, user details services, dynamic URL permission metadata, access decision management, and custom handlers for login, logout, and error responses, along with sample application.yml and database schema.

AuthenticationAuthorizationJWT
0 likes · 20 min read
Master Spring Security: JWT, Custom Handlers, and Dynamic Permissions
Top Architect
Top Architect
Mar 29, 2023 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the roles of resource owner, client, authorization server and resource server, outlines the step‑by‑step authorization flow, and clarifies related terminology such as authentication, federated identity, and delegated authorization.

AuthenticationAuthorizationOAuth2.0
0 likes · 13 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Java Architecture Diary
Java Architecture Diary
Mar 28, 2023 · Information Security

Understanding OAuth 2.0 Device Authorization Flow (RFC 8628)

OAuth 2.0 Device Authorization (RFC 8628) defines a secure flow for granting access tokens to devices lacking browsers or input capabilities, detailing the roles of client devices, authorization servers, user codes, device codes, polling, and token issuance, illustrated with a TV‑mobile example.

AuthorizationDevice FlowOAuth
0 likes · 3 min read
Understanding OAuth 2.0 Device Authorization Flow (RFC 8628)
政采云技术
政采云技术
Mar 21, 2023 · Information Security

In‑Depth Analysis of Spring Security Authentication Process and Core Components

This article provides a comprehensive walkthrough of Spring Security’s authentication mechanism, detailing the filter chain, core security components, and the underlying source‑code flow—from UsernamePasswordAuthenticationFilter through AuthenticationManager, ProviderManager, and DaoAuthenticationProvider—illustrated with code examples and diagrams.

AuthenticationAuthorizationBackend
0 likes · 20 min read
In‑Depth Analysis of Spring Security Authentication Process and Core Components
Bilibili Tech
Bilibili Tech
Mar 10, 2023 · Information Security

Data Security Construction in Berserker Platform

The article outlines Berserker’s comprehensive data‑security framework—built on the CIA triad and 5A methodology—that unifies authentication, authorization, access control, asset protection, and auditing across Hive, Kafka, ClickHouse and ETL tasks, describes the migration from version 1.0 to 2.0 with a redesigned permission system, workspaces, Casbin performance tweaks, and previews future fine‑grained, lifecycle‑wide security enhancements.

AuthenticationAuthorizationBerserker platform
0 likes · 15 min read
Data Security Construction in Berserker Platform
Architecture Digest
Architecture Digest
Mar 10, 2023 · Information Security

Microservice Permission Design with Shiro, Redis Session Sharing, and Dubbo

The article presents a detailed guide on designing and implementing fine-grained permission control for microservices using Apache Shiro, Spring Boot, Dubbo, and Redis to share session data across services, including code examples, configuration steps, and testing of role‑based access.

AuthorizationDubboMicroservices
0 likes · 21 min read
Microservice Permission Design with Shiro, Redis Session Sharing, and Dubbo
Programmer DD
Programmer DD
Feb 16, 2023 · Information Security

How to Install Keycloak and Seamlessly Integrate It with Spring Boot and Spring Cloud

This guide walks through downloading, installing, and initializing Keycloak, creating realms, clients, users and roles, then shows step‑by‑step integration with Spring Boot microservices, token propagation via Feign and Zuul, logout handling, email setup, third‑party login, and essential Keycloak terminology.

AuthorizationKeycloakOAuth2
0 likes · 17 min read
How to Install Keycloak and Seamlessly Integrate It with Spring Boot and Spring Cloud
macrozheng
macrozheng
Feb 1, 2023 · Information Security

Secure Your Spring Boot APIs with JWT: A Step‑by‑Step Guide Using Spring Security

This article explains how to replace Shiro with Spring Security, integrate JWT for stateless authentication, configure the filter chain, set up the necessary Maven dependencies, write the security configuration, custom authentication and verification filters, and manage user details in a Spring Boot backend.

AuthenticationAuthorizationSpring Boot
0 likes · 16 min read
Secure Your Spring Boot APIs with JWT: A Step‑by‑Step Guide Using Spring Security
Java High-Performance Architecture
Java High-Performance Architecture
Jan 29, 2023 · Information Security

Master Spring Security: From Quick Start to Advanced JWT Authentication and RBAC

This comprehensive guide walks you through Spring Security fundamentals, setting up a Spring Boot project, configuring authentication with JWT and Redis, implementing RBAC permission management, customizing error handling, enabling CORS, and addressing CSRF, providing complete code examples and detailed explanations for secure backend development.

AuthenticationAuthorizationJWT
0 likes · 45 min read
Master Spring Security: From Quick Start to Advanced JWT Authentication and RBAC