Tag

credentials

0 views collected around this technical thread.

Wukong Talks Architecture
Wukong Talks Architecture
Aug 13, 2022 · Information Security

Credentials, Cookie‑Session, and JWT: A Journey‑to‑the‑West Analogy for Authentication

This article uses the Journey to the West story as a metaphor to explain credentials, the Cookie‑Session authentication model, and the JWT token scheme, comparing their mechanisms, advantages, disadvantages, and practical implications for modern microservice security.

AuthenticationCookie-SessionJWT
0 likes · 12 min read
Credentials, Cookie‑Session, and JWT: A Journey‑to‑the‑West Analogy for Authentication
php中文网 Courses
php中文网 Courses
Nov 6, 2020 · Information Security

Understanding Authentication, Authorization, Credentials, Cookies, Sessions, Tokens and JWT

This article explains the fundamental concepts of authentication and authorization, the role of credentials, how cookies and sessions manage state, the differences between tokens and JWTs, common security mechanisms, and practical considerations for implementing them in web applications.

AuthenticationJWTauthorization
0 likes · 22 min read
Understanding Authentication, Authorization, Credentials, Cookies, Sessions, Tokens and JWT
Laravel Tech Community
Laravel Tech Community
Aug 9, 2020 · Backend Development

Gradle 6.6 RC6 Release Highlights: Configuration Caching, Runtime Classpath Normalization, and Credential Management

Gradle 6.6 RC6 introduces experimental configuration caching for faster builds, runtime classpath normalization to improve cache hits, and a new credentials API that externalizes authentication details, while also adding Java compilation support, file‑system watch stability, dependency improvements, and various bug fixes.

Build AutomationGradleJava
0 likes · 6 min read
Gradle 6.6 RC6 Release Highlights: Configuration Caching, Runtime Classpath Normalization, and Credential Management
DevOps Cloud Academy
DevOps Cloud Academy
Jul 29, 2020 · Operations

Chapter 5 – Jenkins Credential Management for Pipeline Data Masking

This article explains why Jenkins credentials should be used, describes the supported credential types, shows how Jenkins stores and encrypts credentials, demonstrates decryption methods, and provides step‑by‑step examples of using credentials in pipeline scripts to securely interact with third‑party services.

DevOpsJenkinscredentials
0 likes · 9 min read
Chapter 5 – Jenkins Credential Management for Pipeline Data Masking
DevOps Cloud Academy
DevOps Cloud Academy
Sep 8, 2019 · Operations

Jenkins User, Credential, and Permission Management Guide

This guide explains how to configure Jenkins user management, credential storage, and permission settings, covering entry points, LDAP/GitLab integration, credential types, and role-based access control with detailed steps and visual illustrations for administrators.

JenkinsPermissionscredentials
0 likes · 4 min read
Jenkins User, Credential, and Permission Management Guide
DevOps Cloud Academy
DevOps Cloud Academy
Apr 6, 2019 · Operations

Chapter 3: Managing Jenkins – Users, Credentials, and Permissions

This guide explains how to configure Jenkins user accounts, manage credentials for secure storage, and control access permissions using role‑based strategies, covering viewing, creating, updating, and deleting users and credentials as well as assigning global, project, and node roles.

DevOpsJenkinsPermissions
0 likes · 4 min read
Chapter 3: Managing Jenkins – Users, Credentials, and Permissions