Tagged articles
225 articles
Page 2 of 3
Weimob Technology Center
Weimob Technology Center
Nov 24, 2022 · Information Security

Designing a Flexible Permission Model for WOS: Merging RBAC and PBAC

This article examines traditional RBAC, ABAC, and PBAC access‑control models, evaluates their strengths and weaknesses, and presents a hybrid permission architecture tailored for 微盟's WOS system that combines role‑based and attribute‑based rules to achieve high flexibility and fine‑grained authorization.

ABACAuthorizationBackend
0 likes · 8 min read
Designing a Flexible Permission Model for WOS: Merging RBAC and PBAC
Java High-Performance Architecture
Java High-Performance Architecture
Nov 23, 2022 · Information Security

Master Spring Security with JWT: Build a Secure Java Backend

This tutorial walks through setting up Spring Security with JWT in a Spring Boot project, covering environment configuration, Maven dependencies, custom authentication handlers, permission evaluation, JWT filtering, and testing, providing complete code examples and explanations for building a robust backend authentication system.

AuthenticationAuthorizationJWT
0 likes · 22 min read
Master Spring Security with JWT: Build a Secure Java Backend
Top Architect
Top Architect
Nov 23, 2022 · Information Security

Comprehensive Guide to Front‑End Authentication and Authorization Methods

This article provides an in‑depth overview of authentication, authorization, and permission control concepts and compares ten common front‑end authentication techniques—including HTTP Basic Auth, Session‑Cookie, Token, JWT, SSO, OAuth 2.0, QR‑code login and one‑click login—detailing their workflows, advantages, drawbacks, and typical usage scenarios.

AuthenticationAuthorizationJWT
0 likes · 39 min read
Comprehensive Guide to Front‑End Authentication and Authorization Methods
Code Ape Tech Column
Code Ape Tech Column
Nov 15, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation

This article explains the principles and workflow of Single Sign‑On using OAuth2.0, illustrates the process with a real‑life analogy, and provides a complete Spring Boot example—including authorization server, client configuration, and role‑based access control—suitable for microservice architectures.

AuthenticationAuthorizationMicroservices
0 likes · 12 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation
Selected Java Interview Questions
Selected Java Interview Questions
Oct 29, 2022 · Information Security

Comprehensive Guide to Spring Security: Setup, Authentication, Authorization, and Advanced Configurations

This article provides a detailed tutorial on Spring Security, covering its core concepts, project setup, authentication flow, custom user details service, password encoding, login handling, role-based access control, CSRF protection, and integration with Thymeleaf, complete with code examples.

AuthenticationAuthorizationBackend
0 likes · 14 min read
Comprehensive Guide to Spring Security: Setup, Authentication, Authorization, and Advanced Configurations
IT Architects Alliance
IT Architects Alliance
Oct 7, 2022 · Information Security

Mastering RBAC and JWT with Spring Security: A Step‑by‑Step Guide

This comprehensive tutorial explains RBAC concepts, model classifications, and permission handling, then walks through implementing Spring Security with in‑memory authentication, JWT integration, custom JSON login filters, password encryption, and database‑backed authentication, providing complete code examples and configuration details.

AuthenticationAuthorizationJWT
0 likes · 18 min read
Mastering RBAC and JWT with Spring Security: A Step‑by‑Step Guide
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Sep 29, 2022 · Information Security

Understanding SSO: When to Use SAML vs OAuth2 & OIDC

This article explains single sign‑on concepts, compares SAML, OAuth2 and OpenID Connect, outlines their benefits and typical workflows, and provides guidance on choosing the right protocol for different security and user‑experience scenarios.

AuthenticationAuthorizationOAuth2
0 likes · 9 min read
Understanding SSO: When to Use SAML vs OAuth2 & OIDC
Java High-Performance Architecture
Java High-Performance Architecture
Sep 26, 2022 · Information Security

Master Spring Security: From Basics to Advanced Customizations

This comprehensive guide walks you through Spring Security fundamentals, authentication flow, project setup, custom user details, password encoding, login handling, 403 error pages, remember‑me functionality, method security annotations, and CSRF protection, providing clear code examples for each topic.

AuthenticationAuthorizationCSRF
0 likes · 16 min read
Master Spring Security: From Basics to Advanced Customizations
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Sep 19, 2022 · Information Security

Master Spring Security: Web Expression Auth & Advanced @PreAuthorize Techniques

This guide demonstrates how to implement Spring Security authentication and authorization using web expression-based rules, custom beans, path variables, multi‑condition expressions, and advanced @PreAuthorize methods, including parameter‑based checks, custom annotations, and custom logic services within a Spring Boot 2.4 application.

AuthorizationPreAuthorizeSpring Boot
0 likes · 5 min read
Master Spring Security: Web Expression Auth & Advanced @PreAuthorize Techniques
Programmer DD
Programmer DD
Sep 13, 2022 · Information Security

Master Spring Security: From Basics to Advanced Customizations

This guide walks through Spring Security fundamentals, including its core authentication and authorization mechanisms, project setup with Maven, customizing usernames, implementing UserDetailsService, creating custom PasswordEncoders, configuring login handling, role and authority checks, CSRF protection, remember‑me functionality, and using security annotations.

AuthenticationAuthorizationCSRF
0 likes · 17 min read
Master Spring Security: From Basics to Advanced Customizations

How to Build a Unified Big Data Security Platform with Ranger and Custom Authorization

This article explains the design and implementation of a unified data security control platform that protects user privacy and corporate data across multiple big‑data components (Hive, Hetu, GaussDB) by integrating Apache Ranger, custom authorization APIs, asynchronous processing, distributed locking, and SDK‑based authentication to achieve fine‑grained, one‑stop permission management.

AuthorizationBig DataDistributed Systems
0 likes · 17 min read
How to Build a Unified Big Data Security Platform with Ranger and Custom Authorization
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 24, 2022 · Information Security

Mastering Custom Exception Handling in Spring Security (Spring Boot 2.4)

This guide explains how Spring Security processes authentication and authorization failures, walks through the default exception flow, and demonstrates multiple ways to customize error handling—including custom failure handlers, access‑denied pages, and JSON responses—using Spring Boot 2.4.12.

AuthenticationAuthorizationException Handling
0 likes · 12 min read
Mastering Custom Exception Handling in Spring Security (Spring Boot 2.4)
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationAuthorizationJWT
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
Ops Development Stories
Ops Development Stories
Aug 16, 2022 · Cloud Native

Master Kubernetes Authentication & Authorization: From Users to RBAC

This article explains how Kubernetes secures its API Server through authentication and authorization, covering user types, authentication methods such as client certificates, bearer tokens, OIDC, and static token files, and then details the RBAC model, role bindings, and service account usage for fine‑grained access control.

AuthorizationCloudNativeKubernetes
0 likes · 18 min read
Master Kubernetes Authentication & Authorization: From Users to RBAC
Java Architect Essentials
Java Architect Essentials
Jul 20, 2022 · Information Security

Spring Security Based System Permission Management Tutorial

This article provides a comprehensive step‑by‑step guide on building a permission management system with Spring Security, covering database design, entity classes, Maven configuration, security configuration, dynamic menu loading, front‑end rendering using Thymeleaf, and complete testing with sample code and screenshots.

AuthenticationAuthorizationSpring Boot
0 likes · 19 min read
Spring Security Based System Permission Management Tutorial
Top Architect
Top Architect
Jun 29, 2022 · Information Security

OAuth 2.0 Protocol Overview and Grant Types

This article provides a comprehensive introduction to the OAuth 2.0 protocol, covering its core concepts, authorization flow, four grant types (authorization code, implicit, resource owner password credentials, client credentials), request and response parameters, token handling, and practical examples with code snippets.

AuthenticationAuthorizationGrant Types
0 likes · 22 min read
OAuth 2.0 Protocol Overview and Grant Types
Alibaba Cloud Native
Alibaba Cloud Native
Jun 21, 2022 · Cloud Native

What’s New in KubeVela 1.4? Secure Multi‑Cluster Delivery, Visual Topology, and VelaD

KubeVela 1.4 introduces built‑in multi‑cluster authentication and authorization, a resource‑topology visualizer, the lightweight VelaD runtime, dozens of new plugins, and a host of workflow enhancements, while outlining the project’s roadmap for observability, workflow and application management.

AuthenticationAuthorizationCloud Native
0 likes · 15 min read
What’s New in KubeVela 1.4? Secure Multi‑Cluster Delivery, Visual Topology, and VelaD
Top Architect
Top Architect
Jun 18, 2022 · Information Security

OAuth 2.0 Protocol Overview and Authorization Flows

This article provides a comprehensive introduction to the OAuth 2.0 protocol, explaining its core concepts, the roles of resource owner, client, authorization server and resource server, and detailing the four grant types—authorization code, implicit, resource‑owner password credentials, and client credentials—along with token request/response formats and refresh token usage.

AuthorizationGrant TypesOAuth2.0
0 likes · 23 min read
OAuth 2.0 Protocol Overview and Authorization Flows
IT Architects Alliance
IT Architects Alliance
Jun 18, 2022 · Information Security

OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types

This article provides a comprehensive introduction to OAuth 2.0, covering its purpose, core roles, token types, four main grant flows (authorization code, implicit, resource‑owner password, client credentials), token refresh mechanisms, and practical request/response examples for developers.

AuthorizationGrant TypesOAuth2.0
0 likes · 22 min read
OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types
Zhuanzhuan Tech
Zhuanzhuan Tech
Jun 13, 2022 · Information Security

Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models

This article introduces the problems of the legacy permission approach at Zhuanzhuan, compares industry‑standard RBAC and ABAC models, explains the design rationale for a hybrid RBAC‑based system, and outlines the core modules, role hierarchy, and permission types for the new unified permission management platform.

ABACAuthorizationRBAC
0 likes · 15 min read
Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models
Code Ape Tech Column
Code Ape Tech Column
May 31, 2022 · Backend Development

Implementing Distributed Authorization in Spring Cloud Microservices with Custom Annotations

This article explains how to shift authentication and authorization from the gateway to downstream Spring Cloud microservices by removing the gateway's ReactiveAuthorizationManager, defining three custom annotations (@RequiresLogin, @RequiresPermissions, @RequiresRoles), creating an AOP aspect to enforce them, and demonstrating their usage in controller methods.

AuthorizationBackendCustom Annotations
0 likes · 9 min read
Implementing Distributed Authorization in Spring Cloud Microservices with Custom Annotations
Baidu Geek Talk
Baidu Geek Talk
Apr 25, 2022 · Information Security

Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC

Baidu’s ToB Account Permission Platform provides a unified, configurable login and permission service—including multi‑tenant account management, SSO, OAuth, and the GD‑RBAC model—delivering secure, high‑performance access for over ten million enterprise accounts across multiple product lines.

AuthenticationAuthorizationBackend
0 likes · 27 min read
Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC
Top Architect
Top Architect
Mar 15, 2022 · Information Security

Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases

This article explains the fundamental differences between JSON Web Token (JWT) and OAuth2, describes how each works, provides code examples of JWT structure, outlines OAuth2 roles and flows, and discusses practical scenarios, advantages, and drawbacks for securing APIs.

API SecurityAuthenticationAuthorization
0 likes · 12 min read
Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases
Top Architect
Top Architect
Mar 8, 2022 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the three main participants, outlines the complete authorization flow with step‑by‑step details, defines key terminology, and discusses deployment scenarios such as web servers, user‑agent apps, and native applications.

APIAuthenticationAuthorization
0 likes · 11 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
360 Quality & Efficiency
360 Quality & Efficiency
Mar 4, 2022 · Information Security

Integrating Apache Shiro with Spring Boot: Core Components, Configuration, and Authentication Flow

This article provides a comprehensive guide on integrating Apache Shiro into a Spring Boot application, covering core components, Maven configuration, bean definitions, security manager setup, custom realms, filter chain configuration, and the complete login authentication flow with code examples.

Apache ShiroAuthenticationAuthorization
0 likes · 12 min read
Integrating Apache Shiro with Spring Boot: Core Components, Configuration, and Authentication Flow
Top Architect
Top Architect
Jan 18, 2022 · Information Security

Comprehensive Spring Security Guide: Authentication, Authorization, Custom Configurations, and CSRF Protection

This article provides an in‑depth tutorial on Spring Security, covering its core concepts, authentication flow, project setup, dependency imports, custom UserDetailsService, password encoding, login handling, role‑based access control, CSRF protection, and integration with Thymeleaf, complete with practical code examples.

AuthenticationAuthorizationCSRF
0 likes · 16 min read
Comprehensive Spring Security Guide: Authentication, Authorization, Custom Configurations, and CSRF Protection
Architecture Digest
Architecture Digest
Jan 17, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation

This article explains the principles and workflow of Single Sign-On (SSO) using OAuth2.0, illustrates the process with a real‑life scenario, compares multi‑point and single‑point login, and provides a complete Spring Boot example for building an authorization server, client, and role‑based access control in micro‑service architectures.

AuthenticationAuthorizationMicroservices
0 likes · 10 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation
Architecture and Beyond
Architecture and Beyond
Jan 17, 2022 · Information Security

Understanding Web Session Management: Concepts, Storage Strategies, and Token‑Based Authentication

This article explains the fundamentals of web session management, compares server‑side, cookie‑based, and token‑based storage methods, discusses authentication versus authorization, and outlines security considerations and best‑practice recommendations for managing user sessions in modern web applications.

AuthorizationBackendCookie
0 likes · 11 min read
Understanding Web Session Management: Concepts, Storage Strategies, and Token‑Based Authentication
Top Architect
Top Architect
Jan 10, 2022 · Information Security

Understanding OAuth2.0 Single Sign‑On (SSO) and Its Implementation with SpringBoot

This article explains the principles of Single Sign‑On using OAuth2.0, illustrates the workflow with a real‑world analogy, and provides a complete SpringBoot example—including authorization server, client configuration, role‑based access control, and micro‑service integration—so readers can master SSO implementation and security design.

AuthenticationAuthorizationOAuth2
0 likes · 14 min read
Understanding OAuth2.0 Single Sign‑On (SSO) and Its Implementation with SpringBoot
Java Interview Crash Guide
Java Interview Crash Guide
Jan 6, 2022 · Information Security

Mastering OAuth2 SSO: Real-World Scenarios and Spring Boot Guide

This article demystifies Single Sign-On using OAuth2.0 by illustrating the authentication and authorization flow through a real‑world analogy, explaining HTTP redirects, detailing the four grant types, and providing a complete Spring Boot implementation with role‑based access control for both client and server sides in microservice architectures.

AuthorizationOAuth2Single Sign-On
0 likes · 11 min read
Mastering OAuth2 SSO: Real-World Scenarios and Spring Boot Guide
21CTO
21CTO
Dec 9, 2021 · Big Data

Designing a Scalable Big Data Permission System: From Hive to Metabase

BanYu’s early data warehouse lacked any access controls, prompting the creation of a comprehensive big‑data permission system that integrates authentication and authorization across Hive, Presto, HDFS, and Metabase using LDAP, Ranger policies, workflow automation, and both synchronous and asynchronous policy initialization.

AuthorizationBig DataHive
0 likes · 16 min read
Designing a Scalable Big Data Permission System: From Hive to Metabase
Java High-Performance Architecture
Java High-Performance Architecture
Dec 2, 2021 · Information Security

Mastering Spring Boot Security: A Minimalist Guide to Integrating Apache Shiro

This tutorial walks through building a Spring Boot application with Apache Shiro, covering core concepts, database schema design, Maven dependencies, configuration files, entity and DAO layers, service implementations, Shiro realm and security configuration, login handling, role and permission testing, and future extension ideas.

Apache ShiroAuthenticationAuthorization
0 likes · 19 min read
Mastering Spring Boot Security: A Minimalist Guide to Integrating Apache Shiro
Code Ape Tech Column
Code Ape Tech Column
Dec 2, 2021 · Information Security

Comprehensive Guide to OAuth2.0: Principles, Four Grant Types, and Implementation with Spring Security

This article explains why OAuth2.0 is needed, clarifies the differences between tokens and passwords, describes the OAuth2.0 protocol and its four grant types, and provides a step‑by‑step Spring Boot + Spring Cloud Alibaba implementation of an authorization server and a resource server with full code examples.

AuthenticationAuthorizationSpring Boot
0 likes · 22 min read
Comprehensive Guide to OAuth2.0: Principles, Four Grant Types, and Implementation with Spring Security
Code Ape Tech Column
Code Ape Tech Column
Nov 29, 2021 · Information Security

Implementing JWT-Based Authentication and Authorization with Spring Security in a Frontend‑Backend Separated Architecture

This article explains how to use Spring Security together with JWT to build a stateless authentication system for front‑end/back‑end separated applications, covering token issuance, refresh logic, custom filters, handlers, UserDetailsService implementation, global security configuration, and testing procedures.

AuthenticationAuthorizationBackend
0 likes · 12 min read
Implementing JWT-Based Authentication and Authorization with Spring Security in a Frontend‑Backend Separated Architecture
Programmer DD
Programmer DD
Nov 24, 2021 · Information Security

Shiro vs Spring Security: Which Java Security Framework Fits Your Project?

This article compares Apache Shiro and Spring Security, outlining their core concepts, execution flows, key features, and practical guidance to help developers choose the most suitable Java security framework based on project requirements and team expertise.

AuthenticationAuthorizationJava Security
0 likes · 5 min read
Shiro vs Spring Security: Which Java Security Framework Fits Your Project?
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Nov 8, 2021 · Information Security

Comprehensive Apache Shiro Tutorial: Introduction, Configuration, Realms, Authentication Strategies, Encryption, Salt, Authorization, Spring Integration, and Caching

This extensive guide explains Apache Shiro's core concepts, demonstrates how to set up simple authentication, configure various Realm types, apply multi‑realm authentication strategies, encrypt passwords with hashing and salting, implement custom authorization, integrate Shiro with Spring MVC, explore different login methods, use JSP tags for UI control, and enable caching with Ehcache, providing complete code examples throughout.

Apache ShiroAuthenticationAuthorization
0 likes · 47 min read
Comprehensive Apache Shiro Tutorial: Introduction, Configuration, Realms, Authentication Strategies, Encryption, Salt, Authorization, Spring Integration, and Caching
Code Ape Tech Column
Code Ape Tech Column
Oct 29, 2021 · Information Security

Understanding OAuth2 Single Sign-On (SSO) and Its Spring Boot Implementation

This article explains the principles of Single Sign-On using OAuth2.0, illustrates the flow with a real‑world analogy, details HTTP redirection, compares grant types, and provides a complete Spring Boot implementation of an authorization server, client application, and role‑based access control for microservices.

AuthenticationAuthorizationSSO
0 likes · 12 min read
Understanding OAuth2 Single Sign-On (SSO) and Its Spring Boot Implementation
Java Architect Essentials
Java Architect Essentials
Oct 8, 2021 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, details token types such as access and refresh tokens, introduces JWT principles and usage, and discusses security considerations and distributed session‑sharing strategies for modern web applications.

AuthenticationAuthorizationCookie
0 likes · 22 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT
Airbnb Technology Team
Airbnb Technology Team
Sep 22, 2021 · Backend Development

Design and Implementation of Himeji: A Zanzibar‑Based Centralized Authorization System at Airbnb

Airbnb replaced duplicated, latency‑prone authorization checks in its new service‑oriented architecture by moving them into data services and building Himeji, a Zanzibar‑inspired centralized permission store that uses triple‑based policies, configurable unions, sharded caching, and Aurora backing to deliver sub‑10 ms latency for millions of checks per second with 99.999 % availability.

AuthorizationBackendDistributed Systems
0 likes · 12 min read
Design and Implementation of Himeji: A Zanzibar‑Based Centralized Authorization System at Airbnb
Laravel Tech Community
Laravel Tech Community
Aug 28, 2021 · Backend Development

Apache APISIX 2.9 Release: New authz-casbin Plugin, Dynamic Real-IP Configuration, and Enhanced External Plugin Support

Apache APISIX 2.9 introduces the authz‑casbin authorization plugin, dynamic per‑route real‑ip configuration, and significant enhancements to external plugin mechanisms, including unique keys for Plugin Runner and reverse information retrieval, alongside richer features for existing plugins such as request‑id and error‑log‑logger.

Apache APISIXAuthorizationPlugins
0 likes · 6 min read
Apache APISIX 2.9 Release: New authz-casbin Plugin, Dynamic Real-IP Configuration, and Enhanced External Plugin Support
macrozheng
macrozheng
Aug 24, 2021 · Backend Development

Master Microservice Authentication with Sa-Token and Spring Cloud Gateway

This tutorial walks through building a microservice authentication and authorization solution using Sa-Token, Spring Cloud Gateway, Nacos, and Redis, detailing the setup of gateway, authentication, and protected API services, configuration files, custom permission handling, and a complete demo with Postman.

AuthenticationAuthorizationJava
0 likes · 17 min read
Master Microservice Authentication with Sa-Token and Spring Cloud Gateway
macrozheng
macrozheng
Aug 19, 2021 · Backend Development

Mastering Sa-Token: Simplify SpringBoot Authentication and Authorization

This guide walks you through integrating the lightweight Sa-Token framework into a SpringBoot project, covering dependency setup, configuration, login, role and permission checks, as well as global exception handling, with complete code examples and practical screenshots.

AuthenticationAuthorizationJava
0 likes · 13 min read
Mastering Sa-Token: Simplify SpringBoot Authentication and Authorization
Programmer DD
Programmer DD
Aug 7, 2021 · Information Security

Essential Keycloak Adapter Settings for Spring Security Integration

This article outlines the most commonly used Keycloak adapter configuration properties for Spring Security integration, explaining each setting such as realm, resource, auth-server-url, SSL requirements, CORS, bearer-only mode, and client credentials, and provides guidance on when and how to apply them.

AdapterAuthenticationAuthorization
0 likes · 6 min read
Essential Keycloak Adapter Settings for Spring Security Integration
Code Ape Tech Column
Code Ape Tech Column
Jul 23, 2021 · Information Security

Mastering OAuth2 SSO with SpringBoot: A Step‑by‑Step Guide

This article explains the principles of Single Sign‑On using OAuth2.0, illustrates the flow with a real‑world analogy, and provides a complete SpringBoot implementation for both the authorization server and client, including role‑based permission control and microservice integration.

AuthenticationAuthorizationMicroservices
0 likes · 11 min read
Mastering OAuth2 SSO with SpringBoot: A Step‑by‑Step Guide
Programmer DD
Programmer DD
Jul 21, 2021 · Information Security

Why OIDC Extends OAuth2: Secure Authentication with Keycloak Explained

This article explains how OpenID Connect (OIDC) builds on OAuth 2.0 to provide authentication, demonstrates a practical Keycloak integration with a Spring Boot app, and walks through a complete authorization flow for a photo‑storage service using client credentials and secure token exchange.

AuthenticationAuthorizationKeycloak
0 likes · 8 min read
Why OIDC Extends OAuth2: Secure Authentication with Keycloak Explained
Programmer DD
Programmer DD
Jul 16, 2021 · Information Security

Secure Your Spring Boot App with Keycloak: Step‑by‑Step OIDC Integration

This guide walks you through creating a Keycloak realm, registering a client, defining roles and mappings, obtaining and refreshing JWT tokens, and configuring a Spring Boot application with the Keycloak Spring Boot starter to protect endpoints via OIDC authentication.

AuthenticationAuthorizationJava
0 likes · 8 min read
Secure Your Spring Boot App with Keycloak: Step‑by‑Step OIDC Integration
Programmer DD
Programmer DD
Jul 9, 2021 · Information Security

Hands‑On Keycloak: Install, Explore Realms & Users with Docker

This article walks you through installing Keycloak 14.0.0 via Docker, configuring the admin console, creating custom realms and users, and explains core concepts such as realms, authentication, authorization, roles, groups, clients, and identity providers for practical security integration.

AuthenticationAuthorizationDocker
0 likes · 8 min read
Hands‑On Keycloak: Install, Explore Realms & Users with Docker
TAL Education Technology
TAL Education Technology
Jul 8, 2021 · Frontend Development

Resolving WeChat H5 Authorization Loops, Poster Generation, and Page Performance Tracking

This article details the challenges encountered when developing WeChat H5 pages—such as authorization‑loop redirects, cross‑origin poster creation with html2canvas, iPhone 100vh scrolling bugs, and precise performance timing using window.performance—and presents practical code‑based solutions and compatibility tips for both iOS and Android devices.

AuthorizationCanvasH5
0 likes · 12 min read
Resolving WeChat H5 Authorization Loops, Poster Generation, and Page Performance Tracking
Programmer DD
Programmer DD
Jul 8, 2021 · Information Security

Keycloak Explained: Powerful Open‑Source SSO Solution, Pros & Cons

Keycloak, Red Hat’s open‑source identity and access management platform, offers a comprehensive SSO solution with extensive protocols, admin UI, Spring Security integration, and customizable features, but its complexity and steep learning curve may pose challenges for smaller projects.

AuthenticationAuthorizationIdentity Management
0 likes · 7 min read
Keycloak Explained: Powerful Open‑Source SSO Solution, Pros & Cons
Code Ape Tech Column
Code Ape Tech Column
Jun 18, 2021 · Information Security

Mastering RBAC: From Basic Models to Advanced Permission Architectures

This article explains the fundamentals of permission management, detailing the classic RBAC0 model and its extensions RBAC1‑RBAC3, and explores how roles, users, groups, organizations, and positions interrelate in both single‑system and distributed micro‑service architectures, including practical table designs and framework options.

AuthorizationBackend SecurityMicroservices
0 likes · 12 min read
Mastering RBAC: From Basic Models to Advanced Permission Architectures
Open Source Tech Hub
Open Source Tech Hub
Apr 8, 2021 · Information Security

How to Implement ABAC with PHP‑Casbin for Fine‑Grained Access Control

This guide explains how to use PHP‑Casbin to enforce attribute‑based access control (ABAC) by defining request, policy, and matcher sections, creating attribute‑rich objects, and calling the enforcer to obtain true or false decisions for different subjects and resources.

ABACAttribute-Based Access ControlAuthorization
0 likes · 2 min read
How to Implement ABAC with PHP‑Casbin for Fine‑Grained Access Control
Top Architect
Top Architect
Mar 31, 2021 · Information Security

Comparison of Apache Shiro and Spring Security: Features, Execution Flow, and Choosing the Right Framework

This article compares Apache Shiro and Spring Security, outlining each framework's features, execution flow, and strengths, and provides guidance on when to choose Shiro for lightweight, framework-agnostic projects versus Spring Security for deeper Spring integration and broader community support.

AuthenticationAuthorizationJava
0 likes · 5 min read
Comparison of Apache Shiro and Spring Security: Features, Execution Flow, and Choosing the Right Framework
Top Architect
Top Architect
Feb 28, 2021 · Information Security

Comparison of JWT and OAuth2: Concepts, Implementation, and Use Cases

This article explains the fundamental differences between JSON Web Token (JWT) and OAuth2, describes their structures, security considerations, implementation details, and outlines appropriate scenarios for using each method to protect APIs.

AuthenticationAuthorizationJWT
0 likes · 10 min read
Comparison of JWT and OAuth2: Concepts, Implementation, and Use Cases
Open Source Tech Hub
Open Source Tech Hub
Feb 27, 2021 · Information Security

How Casbin Simplifies Access Control with Flexible Models and Policies

Casbin is an open‑source access‑control framework that supports multiple programming languages, offers customizable request formats, role inheritance, super‑user shortcuts, and built‑in matchers, while delegating authentication and user management to other components.

AuthorizationCasbinPERM Model
0 likes · 7 min read
How Casbin Simplifies Access Control with Flexible Models and Policies
php Courses
php Courses
Feb 5, 2021 · Backend Development

Implementing Role-Based Access Control (RBAC) with the Auth Class in ThinkPHP

This guide explains how to set up an Auth class in ThinkPHP, create the necessary database tables for groups and rules, design admin and permission tables, configure user‑group relationships, handle login sessions, and integrate the Auth class into a common controller to enforce RBAC checks.

AuthenticationAuthorizationBackend
0 likes · 4 min read
Implementing Role-Based Access Control (RBAC) with the Auth Class in ThinkPHP
21CTO
21CTO
Feb 2, 2021 · Information Security

JWT vs OAuth2: Which Authentication Method Is Right for Your API?

This article explains the fundamental differences between JSON Web Tokens (JWT) and OAuth2, outlines their structures, security considerations, implementation details, and compares their advantages, drawbacks, and suitable use cases to help developers choose the appropriate method for securing APIs.

API SecurityAuthorizationJWT
0 likes · 10 min read
JWT vs OAuth2: Which Authentication Method Is Right for Your API?
Code Ape Tech Column
Code Ape Tech Column
Feb 2, 2021 · Information Security

JWT vs OAuth2: Which API Security Method Fits Your Needs?

This article explains the fundamental differences between JSON Web Tokens (JWT) and OAuth 2.0, outlines their structures, roles, and grant types, compares implementation effort and risk, and provides guidance on choosing the right approach for various API security scenarios.

API SecurityAuthenticationAuthorization
0 likes · 11 min read
JWT vs OAuth2: Which API Security Method Fits Your Needs?
Code Ape Tech Column
Code Ape Tech Column
Jan 26, 2021 · Backend Development

Step‑by‑Step Guide to Building SSO with JWT and Spring Security

This tutorial explains the concept of Single Sign‑On, demonstrates a simple ticket‑based analogy, introduces JWT structure and RSA signing, and walks through a complete Spring Boot implementation—including project layout, Maven dependencies, configuration files, utility classes, custom authentication and verification filters, security configuration, and Postman testing—so readers can build a secure SSO service from scratch.

AuthenticationAuthorizationJWT
0 likes · 25 min read
Step‑by‑Step Guide to Building SSO with JWT and Spring Security
Senior Brother's Insights
Senior Brother's Insights
Jan 20, 2021 · Information Security

Understanding Apache Shiro: Core Concepts, Architecture, and Features

This article introduces Apache Shiro, a lightweight Java security framework, covering its authentication, authorization, cryptography, session management, core components, module functions, and overall architecture to help developers grasp its practical use in permission management.

Apache ShiroAuthorizationJava Security
0 likes · 10 min read
Understanding Apache Shiro: Core Concepts, Architecture, and Features
Didi Tech
Didi Tech
Dec 17, 2020 · Information Security

Didi's Big Data Security Permission System: User Authentication and Column-Level Authorization

Didi’s big‑data platform secures user access by adding a custom password‑based Hadoop authentication stored on the NameNode and managed through its Shumeng user‑management service, while enforcing column‑level, role‑based permissions via an Apache Ranger‑powered system that classifies data, generates policies, and now governs millions of assets.

AuthorizationColumn Levelranger
0 likes · 12 min read
Didi's Big Data Security Permission System: User Authentication and Column-Level Authorization
Youzan Coder
Youzan Coder
Nov 25, 2020 · Information Security

Design and Implementation of an Interface Authorization Scanning Platform

The article presents a systematic, automated platform that captures, replays, and compares API requests using intelligent sampling and vertical/horizontal privilege checks to detect authorization flaws, dramatically reducing manual testing effort, uncovering over twenty issues monthly, and outlining future CI integration and AI‑enhanced detection.

APIAuthorizationAutomation
0 likes · 16 min read
Design and Implementation of an Interface Authorization Scanning Platform
Fulu Network R&D Team
Fulu Network R&D Team
Nov 9, 2020 · Backend Development

Unified Authentication and Authorization Service – Technical Overview and Quick‑Start Guide

This article introduces the background, technical stack, core features, step‑by‑step deployment instructions, and future plans of a .NET Core and React based unified authentication and authorization system designed to replace disparate login mechanisms across multiple company applications.

.NET CoreAuthorizationIdentityServer4
0 likes · 7 min read
Unified Authentication and Authorization Service – Technical Overview and Quick‑Start Guide
Tencent Cloud Developer
Tencent Cloud Developer
Oct 22, 2020 · Mobile Development

Design and Implementation of Login and Authorization in WeChat Mini Programs

This article presents a comprehensive design for WeChat Mini Program login and authorization, detailing business scenarios, silent‑login flow with token management, fault‑tolerant session handling, step‑wise UI components for user and phone permissions, and a clear front‑end/back‑end API contract within a layered architecture.

AuthorizationBackendSession Management
0 likes · 25 min read
Design and Implementation of Login and Authorization in WeChat Mini Programs
Top Architect
Top Architect
Oct 15, 2020 · Information Security

Spring Security Guide: Authentication, Authorization, and Web Security

This comprehensive Spring Security guide explains core concepts of authentication and access control, details the AuthenticationManager and ProviderManager interfaces, shows how to customize authentication managers, configure authorization with AccessDecisionManager, secure web requests with filter chains, and apply method-level security, including asynchronous contexts.

AuthenticationAuthorizationJava
0 likes · 23 min read
Spring Security Guide: Authentication, Authorization, and Web Security
360 Tech Engineering
360 Tech Engineering
Oct 12, 2020 · Backend Development

Guide to Building RESTful APIs with ThinkJS

This article explains how to design and implement elegant RESTful APIs using ThinkJS, covering routing conventions, controller generation, custom router configuration, CRUD action mapping, token‑based authentication, permission validation with Logic layers, inheritance for reusable checks, and database operations with chainable queries.

AuthorizationBackendNode.js
0 likes · 13 min read
Guide to Building RESTful APIs with ThinkJS
ITPUB
ITPUB
Sep 24, 2020 · Backend Development

Designing GraphQL for Microservices: Key Challenges, Solutions, and Best Practices

This article explains what GraphQL is, how its type system and Relay standard work, the N+1 problem, and presents three architectural approaches—prefixing, schema stitching, and RPC composition—for integrating GraphQL into microservices, along with authentication, authorization, and routing considerations.

AuthenticationAuthorizationGraphQL
0 likes · 34 min read
Designing GraphQL for Microservices: Key Challenges, Solutions, and Best Practices
Swan Home Tech Team
Swan Home Tech Team
Sep 16, 2020 · Information Security

Understanding Account System Capabilities, Authentication, and Security

This article provides a comprehensive overview of the PASSPORT account system, detailing its registration process, login mechanisms, authentication methods, security challenges, system evolution, and stability considerations to guide developers in building robust and secure user identity services.

AuthenticationAuthorizationPassport
0 likes · 8 min read
Understanding Account System Capabilities, Authentication, and Security
Selected Java Interview Questions
Selected Java Interview Questions
Sep 1, 2020 · Information Security

Design of Permission System and RBAC Models

This article explains the fundamentals and extensions of role‑based access control (RBAC), covering user, role, permission, organization, and group models, authorization workflows, database schema, and common frameworks such as Apache Shiro and Spring Security for building robust permission systems.

AuthorizationPermission ModelRBAC
0 likes · 12 min read
Design of Permission System and RBAC Models
Laravel Tech Community
Laravel Tech Community
Aug 8, 2020 · Information Security

Understanding RBAC Permission Models and Authorization Processes

This article explains the core RBAC0 model and its extensions (RBAC1, RBAC2, RBAC3), discusses user groups, organizations and positions, and outlines manual and approval-based authorization workflows along with a sample database schema for implementing role‑based access control in complex systems.

AuthorizationPermission ModelRBAC
0 likes · 10 min read
Understanding RBAC Permission Models and Authorization Processes
Architecture Digest
Architecture Digest
Aug 4, 2020 · Information Security

Integrating Apache Shiro with Spring Boot for Authentication and Authorization

This guide demonstrates how to integrate Apache Shiro into a Spring Boot application, covering project setup, Maven dependencies, configuration of Redis-backed session and cache management, creation of utility and realm classes, and implementation of role‑based permission controls with example controllers and Postman testing.

AuthenticationAuthorizationJava
0 likes · 22 min read
Integrating Apache Shiro with Spring Boot for Authentication and Authorization
Java Captain
Java Captain
Jul 26, 2020 · Information Security

Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT

This article explains the fundamentals of authentication and authorization, the roles of credentials, cookies, sessions, various token types including access and refresh tokens, and details the structure, generation, and usage of JWTs, while comparing security considerations and distributed session sharing strategies.

AuthenticationAuthorizationCookie
0 likes · 21 min read
Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT
Laravel Tech Community
Laravel Tech Community
Apr 25, 2020 · Backend Development

Laravel Auth Cheat Sheet

This cheat sheet provides a concise reference of Laravel's Auth facade methods for user authentication and session handling, as well as Gate-based authorization techniques, including ability definitions, permission checks, policy generation, and controller or middleware integration.

AuthorizationBackendLaravel
0 likes · 5 min read
Laravel Auth Cheat Sheet
Laravel Tech Community
Laravel Tech Community
Apr 14, 2020 · Backend Development

Laravel Authorization: Using Gates and Policies

This guide explains Laravel's built‑in authorization features, covering how to define and register Gates and Policies, how to check permissions via the Gate facade, middleware, controller helpers, Blade directives, and includes practical code examples for common CRUD actions.

AuthorizationLaravelPHP
0 likes · 15 min read
Laravel Authorization: Using Gates and Policies
Architecture Digest
Architecture Digest
Dec 29, 2019 · Information Security

Spring Security Guide: Authentication, Authorization, and Customizing Filter Chains

This guide introduces Spring Security fundamentals, explaining authentication and authorization concepts, the core interfaces such as AuthenticationManager and AccessDecisionManager, how to configure them with Spring Boot, customize filter chains, apply method‑level security, and handle thread‑bound security contexts for asynchronous processing.

AuthenticationAuthorizationJava
0 likes · 18 min read
Spring Security Guide: Authentication, Authorization, and Customizing Filter Chains
Programmer DD
Programmer DD
Dec 19, 2019 · Information Security

Master Role-Based Access Control with Spring Security: Practical Guide

This article explains how to implement role‑based access control in Spring Security by embedding roles into UserDetails, configuring HttpSecurity with hasRole/hasAnyRole/hasAuthority, handling anonymous users, and using permitAll, providing code examples and detailed explanations for each approach.

AuthorizationBackend SecurityJava
0 likes · 7 min read
Master Role-Based Access Control with Spring Security: Practical Guide