Tag

JWT

1 views collected around this technical thread.

Java Captain
Java Captain
Jun 3, 2025 · Information Security

Integrating Spring Security with Spring Boot for JWT Authentication and Authorization

This article demonstrates how to integrate Spring Security into a Spring Boot application, configure JWT‑based authentication, implement custom AES encryption, define user and role entities, set up service and controller layers, and configure security, filter, and CORS settings to achieve secure login and permission management.

AuthenticationAuthorizationJWT
0 likes · 19 min read
Integrating Spring Security with Spring Boot for JWT Authentication and Authorization
Code Ape Tech Column
Code Ape Tech Column
May 27, 2025 · Information Security

Combining JWT and Session for Secure and Scalable User Authentication

This article explains how JWT provides stateless authentication while Session adds an extra security layer and lifecycle management, and demonstrates their combined use with Java code to achieve both scalability and fine‑grained control over user sessions.

AuthenticationJWTJava
0 likes · 8 min read
Combining JWT and Session for Secure and Scalable User Authentication
Top Architect
Top Architect
May 7, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, token encryption, secure storage, expiration policies, two‑factor authentication and safe token refresh mechanisms.

AuthenticationJWTWeb Development
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

AuthenticationHTTPSJWT
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Selected Java Interview Questions
Selected Java Interview Questions
Apr 8, 2025 · Backend Development

Authentication Implementation: Choosing Between JWT and Session in Backend Development

This article explains the technical selection between JWT and session for authentication, compares their differences, advantages, and disadvantages, and provides a complete Java implementation—including token generation, Redis storage, login/logout, password update, and request interception—demonstrating why JWT was chosen for a distributed backend system.

AuthenticationJWTJava
0 likes · 13 min read
Authentication Implementation: Choosing Between JWT and Session in Backend Development
Architect
Architect
Apr 6, 2025 · Information Security

Technical Selection and Implementation of Authentication: JWT vs Session

This article compares JWT and session-based authentication, detailing their differences, certification processes, advantages, disadvantages, security considerations, performance impacts, token renewal, and revocation strategies, and provides a complete Java implementation using Spring, Redis, and custom utility classes.

AuthenticationJWTJava
0 likes · 12 min read
Technical Selection and Implementation of Authentication: JWT vs Session
Code Mala Tang
Code Mala Tang
Apr 5, 2025 · Information Security

Secure FastAPI APIs with JWT: Step‑by‑Step Authentication & Role‑Based Authorization

Learn how to implement stateless JWT authentication and role‑based authorization in FastAPI, covering token structure, installation of PyJWT, creating login and protected endpoints, custom dependencies, and testing via Swagger UI, while highlighting security benefits and best practices for robust backend APIs.

AuthenticationAuthorizationJWT
0 likes · 11 min read
Secure FastAPI APIs with JWT: Step‑by‑Step Authentication & Role‑Based Authorization
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Mar 9, 2025 · Backend Development

Spring Boot 3 Security Tutorial: AOP, Custom Annotations & JWT

This article presents a continuously updated collection of over 100 Spring Boot 3 practical cases, demonstrating how to implement permission authentication using Spring AOP, custom annotations, JWT utilities, interceptors, a global exception handler, a security context, and a custom argument resolver, complete with test examples and screenshots.

AOPJWTJava
0 likes · 12 min read
Spring Boot 3 Security Tutorial: AOP, Custom Annotations & JWT
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Feb 27, 2025 · Frontend Development

Token Silent Refresh in Frontend Development: Concepts, Strategies, and Implementation

This article explains the fundamentals of token‑based authentication, the drawbacks of fixed token lifetimes, and presents multiple silent‑refresh techniques—including double‑token mechanisms, front‑end timers, server‑side proactive refresh, and concurrency‑safe lock strategies—along with practical code examples and performance considerations for high‑concurrency scenarios.

AuthenticationAxiosJWT
0 likes · 15 min read
Token Silent Refresh in Frontend Development: Concepts, Strategies, and Implementation
Architect's Guide
Architect's Guide
Feb 21, 2025 · Information Security

Technical Selection and Implementation of Authentication: JWT vs Session in a Java Backend

This article compares JWT and session authentication, discusses their differences, advantages, security and performance considerations, and provides a complete Java implementation with Redis integration, including token generation, validation, renewal, and interceptor configuration for secure backend services.

AuthenticationJWTJava
0 likes · 13 min read
Technical Selection and Implementation of Authentication: JWT vs Session in a Java Backend
Architect's Guide
Architect's Guide
Jan 25, 2025 · Information Security

Understanding Session and Token‑Based Authentication with JWT in Java

This article explains the stateless nature of HTTP, compares session‑based and token‑based authentication, describes JWT structure and security considerations, and provides Java code examples for implementing login, token generation, verification, and extraction in a backend application.

AuthenticationJWTJava
0 likes · 8 min read
Understanding Session and Token‑Based Authentication with JWT in Java
Top Architect
Top Architect
Jan 9, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session methods, outlines common token security threats such as theft, replay and forgery, and provides practical measures—including HTTPS, encryption, secure storage, expiration policies, two‑factor authentication, and safe token refresh—to protect token integrity in modern web applications.

AuthenticationJWTWeb Security
0 likes · 12 min read
Understanding JWT Token Security and Mitigation Strategies
Java Architect Essentials
Java Architect Essentials
Nov 29, 2024 · Information Security

Combining JWT and Session for Secure User Authentication and Authorization

This article explains the complementary roles of JWT and server‑side Session in user authentication and authorization, outlines why Session is needed for added security and lifecycle management, and provides Java code examples demonstrating their integrated usage.

AuthenticationAuthorizationJWT
0 likes · 7 min read
Combining JWT and Session for Secure User Authentication and Authorization
Top Architect
Top Architect
Nov 27, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT in Java

This article explains the concepts and models of Role‑Based Access Control (RBAC), demonstrates how to configure RBAC permissions in Spring Security, and provides step‑by‑step Java code for integrating JWT authentication, password encryption, and custom login filters for secure backend development.

JWTJavaRBAC
0 likes · 18 min read
Understanding RBAC and Implementing Spring Security with JWT in Java
Top Architect
Top Architect
Nov 23, 2024 · Backend Development

RBAC Permission Analysis and Spring Security Tutorial with JWT Integration

This comprehensive tutorial explains RBAC concepts and models, demonstrates basic Spring Security setup, shows how to integrate JWT for stateless authentication, covers JSON‑based login, password encryption with BCrypt, and database‑backed authentication, providing full code examples for each step.

AuthenticationJWTJava
0 likes · 16 min read
RBAC Permission Analysis and Spring Security Tutorial with JWT Integration
37 Interactive Technology Team
37 Interactive Technology Team
Nov 11, 2024 · Information Security

Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)

JSON Web Token (JWT) is a compact, self‑contained, stateless token that encodes header, payload, and signature in Base64URL, enabling secure, signature‑verified authentication without server‑side session storage, simplifying scaling, supporting cross‑domain use, while offering advantages like lightweight extensibility and drawbacks such as revocation difficulty and secret‑key reliance.

AuthenticationAuthorizationJSON
0 likes · 16 min read
Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)
Top Architect
Top Architect
Oct 29, 2024 · Information Security

Understanding JWT Token Security: Threats and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, token encryption, secure storage, short expiration, two‑factor authentication and safe token refresh mechanisms.

AuthenticationJWTWeb Security
0 likes · 13 min read
Understanding JWT Token Security: Threats and Mitigation Strategies
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Oct 24, 2024 · Backend Development

Master Fine-Grained Permission Control in Spring Boot 3 with JWT and SpEL

This article demonstrates how to implement fine‑grained permission checks in Spring Boot 3 without using Spring Security, by creating custom HandlerInterceptors, JWT utilities, DAO and service layers, and integrating SpEL expressions for dynamic authorization, complete with code snippets and test results.

HandlerInterceptorJWTSPEL
0 likes · 13 min read
Master Fine-Grained Permission Control in Spring Boot 3 with JWT and SpEL
Lobster Programming
Lobster Programming
Oct 23, 2024 · Backend Development

How to Enforce Single-Device Login with Session, Token, and JWT

This article explains three backend strategies—session‑cookie, token, and JWT—to ensure an account can only be active on one device at a time, detailing the workflow, data structures, and Redis integration needed to implement forced logout across multiple endpoints.

JWTRedisSession Management
0 likes · 6 min read
How to Enforce Single-Device Login with Session, Token, and JWT
Top Architect
Top Architect
Oct 2, 2024 · Backend Development

Combining JWT and Session for Secure User Authentication

This article explains how JWT provides stateless user authentication while Session adds an extra security layer and state management, detailing their individual roles, reasons for using Session, combined benefits, and includes Java code examples for implementing login and token validation.

AuthenticationJWTSecurity
0 likes · 9 min read
Combining JWT and Session for Secure User Authentication