Tagged articles
287 articles
Page 2 of 3
Architecture Digest
Architecture Digest
Jul 14, 2024 · Information Security

Why Many People Discourage Using JWT (JSON Web Tokens)

This article explains what JWT is, outlines its workflow, and critically examines its drawbacks—including size overhead, redundant signatures, token revocation challenges, stale data, lack of encryption, and broader security concerns—concluding that JWT is suitable only for short‑lived authorization tokens rather than long‑term session management.

JWTToken
0 likes · 7 min read
Why Many People Discourage Using JWT (JSON Web Tokens)
macrozheng
macrozheng
Jul 12, 2024 · Information Security

Understanding JWT: Secure Token-Based Authentication for Modern Apps

This article explains the evolution from traditional cookie‑session authentication to token‑based JWT, detailing its structure, security mechanisms, implementation steps, advantages, limitations, and practical Java code examples, while also comparing it with modern authentication challenges in web and mobile environments.

AuthenticationJWTJava
0 likes · 15 min read
Understanding JWT: Secure Token-Based Authentication for Modern Apps
Top Architect
Top Architect
Jul 11, 2024 · Information Security

Why Many Developers Discourage Using JWT (JSON Web Token)

This article explains what JWT is, how it works in authentication flows, and details its major drawbacks—including large token size, redundant signatures, revocation difficulties, stale data risks, and lack of encryption—while concluding that JWT may be suitable only for short‑lived, single‑use scenarios.

BackendJWTSecurity
0 likes · 9 min read
Why Many Developers Discourage Using JWT (JSON Web Token)
Eric Tech Circle
Eric Tech Circle
Jun 30, 2024 · Information Security

Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide

This article provides a comprehensive walkthrough of Single Sign‑On (SSO) concepts, common protocols, login flow diagrams, and multiple implementation options, then dives into step‑by‑step deployment of an enterprise‑grade SSO system using Keycloak with Docker or Kubernetes, including configuration, client setup, custom extensions, and practical code snippets.

AuthenticationDockerJWT
0 likes · 17 min read
Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 30, 2024 · Backend Development

Simplify JWT Retrieval in Spring Boot Controllers with a Custom Argument Resolver

This article demonstrates how to create a custom HandlerMethodArgumentResolver in Spring Boot that automatically extracts JWT token data and injects the corresponding user object—or selected fields—directly into controller method parameters, reducing boilerplate and improving code readability.

HandlerMethodArgumentResolverJWTSpring Boot
0 likes · 8 min read
Simplify JWT Retrieval in Spring Boot Controllers with a Custom Argument Resolver
Selected Java Interview Questions
Selected Java Interview Questions
Jun 28, 2024 · Backend Development

Integrating JWT and Spring Security with a Custom SM4 PasswordEncoder in Spring Boot

This article demonstrates how to secure a Spring Boot 2.7.7 application using JWT, Spring Security, and a custom SM4‑based PasswordEncoder, covering dependency setup, security configuration, custom authentication components, token validation filter, and a login endpoint implementation.

Backend DevelopmentCustom PasswordEncoderJWT
0 likes · 14 min read
Integrating JWT and Spring Security with a Custom SM4 PasswordEncoder in Spring Boot
Top Architect
Top Architect
Jun 12, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model classifications, permission concepts, and user‑group usage, then demonstrates how to implement RBAC in a Spring Security application, including in‑memory authentication, JWT integration, JSON login, and password encryption techniques.

AuthenticationJWTJava
0 likes · 17 min read
Understanding RBAC and Implementing Spring Security with JWT
Java High-Performance Architecture
Java High-Performance Architecture
Jun 4, 2024 · Backend Development

Master Spring Security & JWT for Seamless Single Sign-On (SSO)

This comprehensive guide walks you through the concepts of Single Sign-On, the mechanics of JWT, RSA asymmetric encryption, and step‑by‑step integration of Spring Security with JWT, providing full Maven project setup, configuration files, utility classes, custom filters, and testing instructions for a robust distributed authentication system.

AuthenticationBackend DevelopmentJWT
0 likes · 25 min read
Master Spring Security & JWT for Seamless Single Sign-On (SSO)
Top Architect
Top Architect
May 25, 2024 · Backend Development

Java Backend Token Generation Using JWT: Implementation and Usage Guide

This article explains how to prevent duplicate form submissions in Java web applications by generating and validating JWT tokens on the backend, provides complete utility classes and controller examples, and includes step‑by‑step usage instructions with full source code.

JWTJavaToken
0 likes · 16 min read
Java Backend Token Generation Using JWT: Implementation and Usage Guide
Architect's Guide
Architect's Guide
May 19, 2024 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT

This article explains the fundamentals of role‑based access control (RBAC), its model variants, and user‑group usage, then demonstrates how to configure Spring Security with in‑memory authentication, integrate JWT for stateless token‑based authentication, customize JSON login, and securely encrypt passwords using BCrypt.

AuthenticationBackendJWT
0 likes · 15 min read
RBAC Permission Analysis and Spring Security Integration with JWT
Open Source Tech Hub
Open Source Tech Hub
May 17, 2024 · Information Security

How to Secure WebSocket Connections with JWT Authentication

This guide explains the security challenges of WebSocket, outlines a step‑by‑step JWT authentication flow, and presents three practical token‑passing techniques—including URL parameters, post‑connection messages, and sub‑protocols—while emphasizing the use of wss:// and safe token storage.

AuthenticationJWTSecurity
0 likes · 5 min read
How to Secure WebSocket Connections with JWT Authentication
Open Source Tech Hub
Open Source Tech Hub
May 7, 2024 · Information Security

JWT vs Session: Which Authentication Method Fits Your Web App?

This article explains what JWT and Session are, compares their storage, state management, security, performance, cross‑domain support, expiration, use cases, logout mechanisms, and one‑time use scenarios, and helps you decide which authentication approach best suits your application’s needs.

AuthenticationJWTSession
0 likes · 6 min read
JWT vs Session: Which Authentication Method Fits Your Web App?
21CTO
21CTO
Apr 23, 2024 · Information Security

Session vs Token Authentication: Which Is Right for Your Backend?

This article explains how session‑based and token‑based (JWT) authentication work in backend applications, compares their workflows, shows practical Express.js code examples, and helps you decide which method best fits your project's security and scalability needs.

AuthenticationBackendExpress
0 likes · 10 min read
Session vs Token Authentication: Which Is Right for Your Backend?
Architect
Architect
Mar 20, 2024 · Information Security

RBAC Permission Analysis and Spring Security JWT Integration Tutorial

This tutorial explains RBAC concepts and model classifications, demonstrates permission and user‑group management, and provides step‑by‑step guidance for implementing Spring Security with in‑memory authentication, JWT integration, JSON login, password encryption, and database authentication using Java code examples.

JWTJavaPassword Encryption
0 likes · 18 min read
RBAC Permission Analysis and Spring Security JWT Integration Tutorial
Software Development Quality
Software Development Quality
Feb 21, 2024 · Information Security

Master JWT Security: Test, Forge, and Exploit Tokens with jwt_tool.py

jwt_tool.py is a Python toolkit that validates, forges, scans, and manipulates JSON Web Tokens, offering features such as token validity checks, testing of known CVE‑related vulnerabilities, misconfiguration scanning, claim fuzzing, secret/key verification, dictionary‑based weak‑key detection, timestamp tampering, RSA/ECDSA key reconstruction, and interactive token editing.

JWTPythonsecurity testing
0 likes · 4 min read
Master JWT Security: Test, Forge, and Exploit Tokens with jwt_tool.py
php Courses
php Courses
Jan 23, 2024 · Information Security

Using JWT for Secure Authentication in PHP

This article explains how to install the PHP‑JWT library with Composer, generate JSON Web Tokens using JWT::encode, validate them with JWT::decode, and configure custom expiration and not‑before times to enhance authentication security in PHP applications.

AuthenticationJWTPHP
0 likes · 4 min read
Using JWT for Secure Authentication in PHP
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Nov 27, 2023 · Backend Development

Secure Spring Boot APIs with AOP and Spring Security: A Step‑by‑Step Guide

This article explains how to combine Spring AOP and Spring Security in a Spring Boot 2.7.12 application to implement permission verification, covering concepts, required dependencies, custom filters, annotations, aspect logic, global exception handling, test endpoints, JWT token handling, and extensions for SpEL‑based role checks.

JWTSpring Bootaop
0 likes · 11 min read
Secure Spring Boot APIs with AOP and Spring Security: A Step‑by‑Step Guide
Java High-Performance Architecture
Java High-Performance Architecture
Nov 21, 2023 · Information Security

Master Spring Security: Quick Start, JWT Authentication, and RBAC Authorization

This comprehensive guide walks you through setting up Spring Security in a Spring Boot project, configuring password encoding, implementing JWT-based authentication, building custom login and logout endpoints, managing user details with MyBatis Plus, and applying role‑based access control with custom permission handlers, all illustrated with complete code examples.

AuthenticationAuthorizationJWT
0 likes · 40 min read
Master Spring Security: Quick Start, JWT Authentication, and RBAC Authorization
Code Ape Tech Column
Code Ape Tech Column
Oct 27, 2023 · Information Security

Why JWT Is Unsuitable for Session Management and Its Security Risks

This article explains why using JSON Web Tokens for session management is unsafe, detailing misconceptions about their benefits, highlighting security, scalability, and usability drawbacks, and finally outlining appropriate use cases such as short‑lived one‑time authorization tokens.

AuthenticationJWTSession Management
0 likes · 15 min read
Why JWT Is Unsuitable for Session Management and Its Security Risks
Architecture Digest
Architecture Digest
Oct 25, 2023 · Information Security

RBAC Permission Analysis and Spring Security Implementation Guide (including JWT and JSON Login)

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model variants, permission concepts, and user‑group usage, then demonstrates practical Spring Security setups ranging from simple in‑memory authentication to JWT integration, JSON‑based login, password encryption, and database‑backed authentication with full code examples.

AuthorizationJWTJava
0 likes · 18 min read
RBAC Permission Analysis and Spring Security Implementation Guide (including JWT and JSON Login)
Open Source Tech Hub
Open Source Tech Hub
Oct 16, 2023 · Information Security

Mastering JWT Authentication in PHP: From Basics to Advanced Usage

This guide explains the limitations of traditional session authentication, introduces JSON Web Token (JWT) as a scalable cross‑domain solution, and provides step‑by‑step instructions for installing, configuring, generating, and validating JWTs in PHP applications, including supported algorithms and practical code examples.

APIAuthenticationJWT
0 likes · 9 min read
Mastering JWT Authentication in PHP: From Basics to Advanced Usage
MaGe Linux Operations
MaGe Linux Operations
Sep 28, 2023 · Information Security

Mastering JWT: Standard Claims, Custom Tokens, and Renewal Strategies

This article explains JWT payload claims, lists standard and custom claims, shows how to generate a token with expiration in Java, and compares single‑token and double‑token renewal strategies—including OAuth 2.0 approaches and Redis‑based storage—to manage token expiration securely.

AuthenticationJWTJava
0 likes · 5 min read
Mastering JWT: Standard Claims, Custom Tokens, and Renewal Strategies
Architecture Digest
Architecture Digest
Sep 27, 2023 · Information Security

Understanding JWT Claims and Token Renewal Strategies

This article explains the standard JWT claims, shows how to add custom claims with Java code, and compares single‑token and double‑token renewal approaches, including practical examples such as WeChat web authorization and Redis‑based token storage.

JWTOAuth2Security
0 likes · 6 min read
Understanding JWT Claims and Token Renewal Strategies
Programmer DD
Programmer DD
Sep 19, 2023 · Backend Development

Spring Boot Virtual Threads vs WebFlux: Which Delivers Better Performance?

This article summarizes a performance comparison between Spring Boot applications using virtual threads and those built with Spring WebFlux, detailing the test scenario of JWT verification and MySQL queries, the environment, code implementations, benchmark results across various concurrency levels, and concluding that WebFlux outperforms virtual‑threaded Spring Boot.

JWTSpring BootVirtual Threads
0 likes · 9 min read
Spring Boot Virtual Threads vs WebFlux: Which Delivers Better Performance?
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 28, 2023 · Information Security

How to Secure API Transmission with Spring Boot, Vue, and AES/DES Encryption

This guide explains how to protect API data exchange by implementing HTTPS, JWT, rate limiting, MAC, and symmetric encryption (AES/DES) in a Spring Boot backend, while using Vue and Axios on the frontend, including custom annotations, request/response advice, and crypto‑js utilities for end‑to‑end encryption.

AESAPI SecurityJWT
0 likes · 15 min read
How to Secure API Transmission with Spring Boot, Vue, and AES/DES Encryption
Su San Talks Tech
Su San Talks Tech
Aug 24, 2023 · Backend Development

Simplify JWT Token Handling in Spring Using Custom Annotations & ThreadLocal

This article walks through the evolution of a Spring‑based JWT token validation solution, from passing HttpServletRequest into service methods to using a custom @NeedToken annotation, reflection, a base class, and finally ThreadLocal to ensure each request’s token is safely isolated in high‑concurrency environments.

JWTJavaThreadLocal
0 likes · 13 min read
Simplify JWT Token Handling in Spring Using Custom Annotations & ThreadLocal
Su San Talks Tech
Su San Talks Tech
Aug 15, 2023 · Information Security

Master Spring Security & JWT: Build Secure Authentication in Spring Boot

This tutorial explains how to integrate Spring Security with JWT in a Spring Boot application, covering authentication and authorization concepts, filter chain principles, project setup, dependency configuration, security configuration classes, custom token filters, and the complete request‑authentication flow.

AuthenticationAuthorizationJWT
0 likes · 15 min read
Master Spring Security & JWT: Build Secure Authentication in Spring Boot
Architecture Digest
Architecture Digest
Jul 12, 2023 · Backend Development

WeBlog: A Spring Boot + Vue 3.2 Based Full‑Stack Blog System

WeBlog is a front‑end/back‑end separated blogging platform built with Spring Boot, MyBatis‑Plus, MySQL, Spring Security, JWT, Minio, and Vue 3.2 + Element Plus, offering Markdown editing, category/tag management, dashboard statistics, and a complete set of admin and front‑end features.

Full-Stack BlogJWTSpring Boot
0 likes · 7 min read
WeBlog: A Spring Boot + Vue 3.2 Based Full‑Stack Blog System
Architect's Guide
Architect's Guide
Jul 2, 2023 · Information Security

Authentication, Authorization, Credentials, Cookies, Sessions, Tokens and JWT Overview

This article provides a comprehensive overview of authentication and authorization concepts, explains the roles of credentials, compares cookies and sessions, discusses session scaling strategies, introduces token‑based authentication and JWT structure, and highlights security considerations and common encryption algorithms.

AuthorizationJWTSessions
0 likes · 32 min read
Authentication, Authorization, Credentials, Cookies, Sessions, Tokens and JWT Overview
macrozheng
macrozheng
Jun 15, 2023 · Backend Development

How to Build a Reusable Backend Permission System with Spring Security

This article walks through the complete design and implementation of a reusable permission module for a Java e‑commerce backend, covering functional design, database schema, API contracts, and key technical points such as Spring Security, JWT authentication, and Redis‑based performance optimizations.

BackendJWTpermission
0 likes · 8 min read
How to Build a Reusable Backend Permission System with Spring Security
Laravel Tech Community
Laravel Tech Community
Jun 13, 2023 · Information Security

Understanding Tokens, JWT, and Authentication Security

This article explains the principles, structure, and workflow of token‑based authentication—including access and refresh tokens, JWT, CSRF attacks, same‑origin policy, cross‑origin solutions, and common encryption algorithms—highlighting their advantages, limitations, and practical usage in modern web and mobile applications.

AuthenticationJWTSecurity
0 likes · 18 min read
Understanding Tokens, JWT, and Authentication Security
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2023 · Backend Development

Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication

This guide demonstrates how to build a Spring Cloud Gateway for microservices, covering system setup, CORS handling, rate‑limiting with the token‑bucket algorithm, password hashing with BCrypt, and secure JWT‑based authentication, complete with Maven dependencies, configuration files, and filter implementations.

JWTbcryptrate-limiting
0 likes · 28 min read
Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication
MaGe Linux Operations
MaGe Linux Operations
Apr 25, 2023 · Backend Development

Choosing JWT vs Session: A Practical Guide to Secure Backend Authentication

This article compares JWT and session authentication, explains their differences, security and performance trade‑offs, and provides a complete Java implementation with Redis integration, guiding developers on selecting and implementing the most suitable authentication method for distributed backend systems.

AuthenticationJWTSecurity
0 likes · 14 min read
Choosing JWT vs Session: A Practical Guide to Secure Backend Authentication
Architecture Digest
Architecture Digest
Apr 19, 2023 · Backend Development

Technical Selection and Implementation of Authentication Using JWT and Session in a Java Backend

This article compares session‑based and JWT‑based authentication, discusses their advantages, disadvantages, security and performance considerations, and provides a complete Java Spring Boot implementation—including dependency configuration, utility classes, login/logout/password update logic, and interceptor handling—using Redis for token management.

BackendJWTJava
0 likes · 13 min read
Technical Selection and Implementation of Authentication Using JWT and Session in a Java Backend
Java High-Performance Architecture
Java High-Performance Architecture
Apr 5, 2023 · Backend Development

Master Spring Security: JWT, Custom Handlers, and Dynamic Permissions

This article provides a comprehensive guide to configuring Spring Security in a Java backend, covering Maven dependencies, global security settings, JWT token parsing, custom authentication providers, user details services, dynamic URL permission metadata, access decision management, and custom handlers for login, logout, and error responses, along with sample application.yml and database schema.

AuthenticationAuthorizationJWT
0 likes · 20 min read
Master Spring Security: JWT, Custom Handlers, and Dynamic Permissions
MaGe Linux Operations
MaGe Linux Operations
Feb 26, 2023 · Information Security

Mastering JWT: Secure Token Authentication with Spring Boot and Angular

This article explains what JSON Web Tokens are, their structure and security considerations, introduces the JJWT Java library, and provides a complete Spring Boot and Angular example—including Maven setup, Java filters, controllers, and front‑end code—to demonstrate secure token‑based authentication.

AngularAuthenticationJWT
0 likes · 19 min read
Mastering JWT: Secure Token Authentication with Spring Boot and Angular
Java High-Performance Architecture
Java High-Performance Architecture
Jan 29, 2023 · Information Security

Master Spring Security: From Quick Start to Advanced JWT Authentication and RBAC

This comprehensive guide walks you through Spring Security fundamentals, setting up a Spring Boot project, configuring authentication with JWT and Redis, implementing RBAC permission management, customizing error handling, enabling CORS, and addressing CSRF, providing complete code examples and detailed explanations for secure backend development.

AuthenticationAuthorizationJWT
0 likes · 45 min read
Master Spring Security: From Quick Start to Advanced JWT Authentication and RBAC
Top Architect
Top Architect
Jan 7, 2023 · Backend Development

Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication

This article provides a step‑by‑step guide to building a Spring Cloud Gateway for microservices, covering system setup, request routing, cross‑origin handling, token‑bucket rate limiting, password hashing with BCrypt, an overview of symmetric and asymmetric encryption, and JWT‑based authentication with code examples and configuration details.

JWTJavaMicroservices
0 likes · 24 min read
Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication
Java High-Performance Architecture
Java High-Performance Architecture
Dec 24, 2022 · Information Security

Master OAuth2 SSO with Spring Security and JWT: A Complete Step‑by‑Step Guide

This tutorial walks through building a single sign‑on (SSO) solution using OAuth2, Spring Security, and JWT in a Java Spring Boot backend, covering preparation, Maven dependencies, server and client configurations, custom login pages, token handling, logout strategies, project structure, and a full demo with source code.

JWTJavaOAuth2
0 likes · 25 min read
Master OAuth2 SSO with Spring Security and JWT: A Complete Step‑by‑Step Guide
Programmer DD
Programmer DD
Dec 13, 2022 · Information Security

How to Build a Low‑Code, Visual RBAC Permission System with Spring Cloud

This article explains how to design a non‑intrusive, easy‑to‑configure, fine‑grained RBAC permission system using OAuth2, JWT, and Spring Cloud micro‑services, covering architecture, expression syntax, URL patterns, and micro‑frontend integration for scalable, maintainable access control.

JWTOAuth2RBAC
0 likes · 13 min read
How to Build a Low‑Code, Visual RBAC Permission System with Spring Cloud
Java High-Performance Architecture
Java High-Performance Architecture
Dec 8, 2022 · Information Security

Unlocking Secure Unified Account Management with Token‑Based OAuth2

This article explains why enterprises need a standardized account management system, outlines the advantages of token‑based authentication over session‑based approaches, and details the OAuth2 and JWT design, workflow, and technical choices for building a scalable, secure, cross‑service authentication solution.

Account ManagementJWTMicroservices
0 likes · 10 min read
Unlocking Secure Unified Account Management with Token‑Based OAuth2
Xianyu Technology
Xianyu Technology
Nov 29, 2022 · Backend Development

Lombok @Builder JSON Conflict, Dynamic Log Levels, JWT Overview, and Java 8 parallelStream Tips

The brief explains how Lombok’s @Builder can clash with JSON libraries and how adding no‑args and all‑args constructors resolves it, shows how to adjust log levels at runtime via Arthas or Spring’s LoggingSystem, outlines JWT structure and security cautions, and warns of common Java 8 parallelStream performance and correctness pitfalls.

JSONJWTJava
0 likes · 9 min read
Lombok @Builder JSON Conflict, Dynamic Log Levels, JWT Overview, and Java 8 parallelStream Tips
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 28, 2022 · Backend Development

Design and Implementation of the Service Backend Architecture for Editor, Component Platform, and C‑End Application

This article details the overall backend architecture, module relationships, RESTful API design, database schemas, authentication flow, activity creation process, JSON schema validation, component platform APIs, and server‑side rendering considerations for a Node.js‑based service supporting editors, components, and end‑user pages.

JWTMongoDBNode.js
0 likes · 22 min read
Design and Implementation of the Service Backend Architecture for Editor, Component Platform, and C‑End Application
Architecture Digest
Architecture Digest
Nov 25, 2022 · Information Security

Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT

The article explains why enterprises need a unified account management system, defines key authentication terms, outlines the advantages of token‑based security, describes a complete OAuth2 password‑grant flow with JWT, and presents the technical choices and interface designs for implementing a robust, cross‑service authentication solution.

Identity ManagementJWTOAuth2
0 likes · 10 min read
Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT
Java High-Performance Architecture
Java High-Performance Architecture
Nov 23, 2022 · Information Security

Master Spring Security with JWT: Build a Secure Java Backend

This tutorial walks through setting up Spring Security with JWT in a Spring Boot project, covering environment configuration, Maven dependencies, custom authentication handlers, permission evaluation, JWT filtering, and testing, providing complete code examples and explanations for building a robust backend authentication system.

AuthenticationAuthorizationJWT
0 likes · 22 min read
Master Spring Security with JWT: Build a Secure Java Backend
Top Architect
Top Architect
Nov 23, 2022 · Information Security

Comprehensive Guide to Front‑End Authentication and Authorization Methods

This article provides an in‑depth overview of authentication, authorization, and permission control concepts and compares ten common front‑end authentication techniques—including HTTP Basic Auth, Session‑Cookie, Token, JWT, SSO, OAuth 2.0, QR‑code login and one‑click login—detailing their workflows, advantages, drawbacks, and typical usage scenarios.

AuthenticationAuthorizationJWT
0 likes · 39 min read
Comprehensive Guide to Front‑End Authentication and Authorization Methods
Top Architect
Top Architect
Nov 18, 2022 · Backend Development

SpringBoot Backend Scaffold with JWT Authentication and Shiro Authorization

This article introduces a SpringBoot-based backend scaffold that integrates JWT for authentication, Apache Shiro for authorization, Mybatis‑Plus for data access, and includes custom annotations, bcrypt password encryption, AOP transaction management, and step‑by‑step deployment instructions, targeting developers seeking a ready‑to‑use microservice starter.

JWTSecurityShiro
0 likes · 8 min read
SpringBoot Backend Scaffold with JWT Authentication and Shiro Authorization
IT Architects Alliance
IT Architects Alliance
Nov 17, 2022 · Information Security

Comprehensive Guide to Frontend Authentication Methods and Their Differences

This article explains the concepts, relationships, and practical implementations of authentication, authorization, and access control, and compares ten common frontend authentication methods—including HTTP Basic, Session‑Cookie, Token, JWT, SSO, OAuth, and QR‑code login—detailing their workflows, advantages, disadvantages, and suitable scenarios.

JWTOAuthSSO
0 likes · 37 min read
Comprehensive Guide to Frontend Authentication Methods and Their Differences
Programmer DD
Programmer DD
Nov 14, 2022 · Backend Development

Choosing Between JWT and Session: Pros, Cons, and Implementation Guide

This article compares JWT and session authentication, outlines their differences, advantages, security considerations, performance impacts, and provides a complete Java implementation with Redis integration, helping developers decide the best approach for their projects.

AuthenticationJWTJava
0 likes · 16 min read
Choosing Between JWT and Session: Pros, Cons, and Implementation Guide
Architect
Architect
Oct 26, 2022 · Information Security

Choosing Between JWT and Session for Authentication: Technical Selection and Implementation

This article compares JWT and session authentication, discusses their differences, security, performance, and lifecycle considerations, and provides a complete Java implementation—including dependency configuration, token utilities, Redis integration, login/logout flows, password updates, and request interception—guiding developers to select the most suitable approach for their projects.

AuthenticationJWTJava
0 likes · 14 min read
Choosing Between JWT and Session for Authentication: Technical Selection and Implementation
Programmer DD
Programmer DD
Oct 25, 2022 · Backend Development

JWT vs Session: Pros, Cons, and How to Implement Secure Authentication

This article compares JWT and session-based authentication, detailing their differences, advantages, disadvantages, security considerations, performance impacts, and provides a complete Java implementation with token generation, Redis storage, login, logout, password update, and interceptor configuration.

JWTJavaredis
0 likes · 15 min read
JWT vs Session: Pros, Cons, and How to Implement Secure Authentication
Java Architect Essentials
Java Architect Essentials
Oct 20, 2022 · Information Security

RBAC Permission Analysis and Spring Security Implementation with JWT and JSON Login

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model variants, permission concepts, and user‑group usage, then demonstrates practical Spring Security setups including basic configuration, JWT integration, JSON‑based login, password encryption, and database authentication with complete code examples.

JSON LoginJWTPassword Encryption
0 likes · 17 min read
RBAC Permission Analysis and Spring Security Implementation with JWT and JSON Login
IT Architects Alliance
IT Architects Alliance
Oct 7, 2022 · Information Security

Mastering RBAC and JWT with Spring Security: A Step‑by‑Step Guide

This comprehensive tutorial explains RBAC concepts, model classifications, and permission handling, then walks through implementing Spring Security with in‑memory authentication, JWT integration, custom JSON login filters, password encryption, and database‑backed authentication, providing complete code examples and configuration details.

AuthenticationAuthorizationJWT
0 likes · 18 min read
Mastering RBAC and JWT with Spring Security: A Step‑by‑Step Guide
Top Architect
Top Architect
Oct 6, 2022 · Information Security

RBAC Permission Analysis and Spring Security Implementation Guide

This article provides a comprehensive tutorial on role‑based access control (RBAC) concepts, model classifications, permission definitions, user‑group usage, and step‑by‑step implementations of Spring Security, JWT integration, JSON login, password encryption, and database authentication with extensive code examples.

AuthenticationBackend DevelopmentJWT
0 likes · 18 min read
RBAC Permission Analysis and Spring Security Implementation Guide
Top Architect
Top Architect
Sep 30, 2022 · Backend Development

Implementing JWT Blacklist with RedisTokenStore in Spring Security OAuth2

This article explains why JWT is not ideal for logout and token renewal, recommends using a Redis‑backed token store, and provides three Redis‑based blacklist implementations with detailed Java code snippets for extending JwtTokenStore, custom converters, and global filters in Spring Security OAuth2.

JWTJavaOAuth2
0 likes · 12 min read
Implementing JWT Blacklist with RedisTokenStore in Spring Security OAuth2
php Courses
php Courses
Sep 5, 2022 · Frontend Development

10 Common Frontend Authentication Methods and Their Use Cases

This article introduces ten widely used frontend authentication techniques—including HTTP Basic Auth, Session‑Cookie, Token, JWT, SSO, OAuth 2.0, QR‑code login, one‑click login, and more—explaining their scenarios, advantages, and security considerations.

JWTTokenfrontend
0 likes · 3 min read
10 Common Frontend Authentication Methods and Their Use Cases
Su San Talks Tech
Su San Talks Tech
Aug 31, 2022 · Backend Development

Mastering Login Authentication with Spring Cloud Gateway and JWT

This tutorial walks through implementing login authentication using Spring Cloud Gateway and JWT, covering core concepts of authentication, authorization, credential handling, token generation, gateway validation, service integration, and token refresh strategies within a microservice architecture.

AuthenticationBackend DevelopmentJWT
0 likes · 18 min read
Mastering Login Authentication with Spring Cloud Gateway and JWT
Java High-Performance Architecture
Java High-Performance Architecture
Aug 24, 2022 · Information Security

Mastering RBAC and Spring Security: From Basics to JWT Integration

This article provides a comprehensive guide to Role‑Based Access Control (RBAC) concepts, model classifications, and permission management, then walks through practical Spring Security setups—including basic usage, in‑memory authentication, JWT integration, JSON‑based login, password encryption, and database‑backed authentication, complete with code snippets and diagrams.

AuthenticationJWTJava
0 likes · 21 min read
Mastering RBAC and Spring Security: From Basics to JWT Integration
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationAuthorizationJWT
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
Top Architect
Top Architect
Aug 22, 2022 · Information Security

RBAC and Spring Security Tutorial: From Basic Role-Based Access Control to JWT Integration and JSON Login

This article provides a comprehensive guide on implementing role‑based access control (RBAC) with Spring Security, covering RBAC models, password encryption, in‑memory authentication, JWT integration, custom authentication filters for JSON login, and detailed configuration examples with full source code snippets.

AuthenticationJWTJava
0 likes · 16 min read
RBAC and Spring Security Tutorial: From Basic Role-Based Access Control to JWT Integration and JSON Login
Java Captain
Java Captain
Aug 21, 2022 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT and JSON Login

This article explains RBAC concepts and model classifications, demonstrates role‑based permission management, and provides step‑by‑step guides for using Spring Security with simple authentication, JWT token generation, JSON‑based login, password encryption, and database‑backed user authentication in Java applications.

AuthenticationJWTJava
0 likes · 15 min read
RBAC Permission Analysis and Spring Security Integration with JWT and JSON Login
Wukong Talks Architecture
Wukong Talks Architecture
Aug 15, 2022 · Backend Development

Implementing Login Authentication with Spring Cloud Gateway and JWT

This article explains how to integrate JWT-based login authentication into a Spring Cloud micro‑service architecture using Spring Cloud Gateway, detailing the authentication flow, token generation, gateway validation, service‑side user handling, and token refresh strategies with practical code examples.

AuthenticationJWTSpring Cloud
0 likes · 14 min read
Implementing Login Authentication with Spring Cloud Gateway and JWT
Top Architect
Top Architect
Aug 9, 2022 · Backend Development

Implementing a JWT-Based Authentication Center with Spring Boot and Java

This article provides a comprehensive guide to building a JWT authentication service in Java, covering JWT fundamentals, Spring Boot configuration, entity and DAO definitions, service interfaces, token generation and parsing, RSA key handling, controller endpoints, testing procedures, and a comparison with traditional session-based authentication.

AuthenticationJWTJava
0 likes · 20 min read
Implementing a JWT-Based Authentication Center with Spring Boot and Java
Java Architect Essentials
Java Architect Essentials
Jul 1, 2022 · Information Security

Microservice Authentication and Authorization: Problems, Common Schemes, and a Recommended Solution

This article examines the challenges of microservice authorization and reviews common authentication solutions such as CAS SSO, distributed sessions with gateways, client‑token approaches, and finally proposes a Spring Cloud architecture combining Spring Security, OAuth2, JWT and Zuul for unified access control.

JWTOAuth2Spring Cloud
0 likes · 10 min read
Microservice Authentication and Authorization: Problems, Common Schemes, and a Recommended Solution
Laravel Tech Community
Laravel Tech Community
Jun 29, 2022 · Information Security

Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT

This article describes the challenges of fragmented user management in enterprise applications and presents a unified, standardized account management solution based on token authentication, detailing OAuth2 password flow, JWT usage, system architecture, authorization processes, credential renewal, and interface design for secure, scalable access control.

JWTOAuth2access control
0 likes · 7 min read
Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT
Top Architect
Top Architect
Jun 29, 2022 · Information Security

Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT

This article explains the need for a unified account management platform in enterprises, defines key authentication terms, compares session‑based and token‑based approaches, outlines a complete OAuth2 password‑grant flow with JWT tokens, and discusses technical choices, security features, and interface design for modern microservice architectures.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT
IT Services Circle
IT Services Circle
Jun 23, 2022 · Information Security

Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions

This article provides an in‑depth overview of JSON Web Tokens (JWT), explaining their structure, authentication workflow, advantages such as statelessness and CSRF protection, drawbacks like revocation difficulty, and presents practical solutions including blacklist, secret rotation, short‑lived tokens and refresh‑token strategies.

AuthenticationBackendCSRF
0 likes · 13 min read
Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions
Top Architect
Top Architect
Jun 10, 2022 · Information Security

Understanding JWT Claims and Token Renewal Strategies

This article explains the standard JWT claims, demonstrates how to generate a token with custom claims in Java, and compares single‑token and double‑token renewal schemes, including practical steps for handling expiration, refresh logic, and Redis‑based token storage.

AuthenticationBackend DevelopmentJWT
0 likes · 8 min read
Understanding JWT Claims and Token Renewal Strategies
IT Architects Alliance
IT Architects Alliance
May 24, 2022 · Information Security

Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT

This document explains the need for a unified account management system in enterprise cloud platforms, defines key terminology, outlines the advantages of token‑based authentication, describes the OAuth2 password‑grant flow and JWT usage, and details the technical design, interface specifications, and credential renewal process for secure cross‑service access.

JWTOAuth2Security
0 likes · 9 min read
Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT
Top Architect
Top Architect
May 23, 2022 · Information Security

Designing a Unified Token‑Based Authentication System Using OAuth2 and JWT

The article explains how to design a unified, token‑based authentication system for enterprise applications, covering OAuth2 password grant, JWT usage, token issuance, validation, renewal processes, and interface design, while highlighting the benefits of stateless security and cross‑service single sign‑on.

JWTOAuth2Security Architecture
0 likes · 10 min read
Designing a Unified Token‑Based Authentication System Using OAuth2 and JWT
Selected Java Interview Questions
Selected Java Interview Questions
May 20, 2022 · Backend Development

Microservice Authentication and Authorization Solutions with Spring Cloud, Spring Security, OAuth2, and JWT

The article explains the challenges of authentication in microservice architectures and compares several solutions—including CAS single sign‑on, distributed session with Redis, client‑side token with JWT, and a recommended Spring Cloud + Spring Security + OAuth2 + JWT approach—detailing their workflows, advantages, and drawbacks.

Backend DevelopmentJWTMicroservices
0 likes · 10 min read
Microservice Authentication and Authorization Solutions with Spring Cloud, Spring Security, OAuth2, and JWT
IT Architects Alliance
IT Architects Alliance
Apr 22, 2022 · Information Security

Implementing Single Sign-On with Spring Security and JWT – A Comprehensive Guide

This article provides a detailed, step‑by‑step tutorial on building a Spring Security‑based Single Sign‑On solution using JWT, covering SSO concepts, JWT structure, RSA encryption, custom authentication filters, Maven project setup, configuration files, and full code examples for both authentication and resource services.

AuthenticationJWTJava
0 likes · 22 min read
Implementing Single Sign-On with Spring Security and JWT – A Comprehensive Guide
Top Architect
Top Architect
Apr 21, 2022 · Information Security

Implementing Single Sign-On with Spring Security and JWT

This article provides a comprehensive 20,000‑word guide on building a Spring Security‑based single sign‑on solution using JWT, covering the SSO concept, token structure, RSA encryption, Maven project setup, configuration files, custom authentication and verification filters, and end‑to‑end testing with Postman.

AuthenticationJWTJava
0 likes · 23 min read
Implementing Single Sign-On with Spring Security and JWT
Top Architect
Top Architect
Apr 5, 2022 · Information Security

Understanding JSON Web Token (JWT): Structure, Creation, and Signature

This article explains the lightweight JWT specification, demonstrates how to build a token with header, payload, and signature using Base64 encoding and Node.js, and discusses its security properties, verification process, and suitable use cases for web authentication.

AuthenticationBase64JWT
0 likes · 9 min read
Understanding JSON Web Token (JWT): Structure, Creation, and Signature
Architect's Guide
Architect's Guide
Mar 27, 2022 · Information Security

Understanding JSON Web Tokens (JWT): Structure, Creation, and Practical Use

This article explains the lightweight JWT specification, walks through its three-part structure (header, payload, signature), shows how to encode and sign a token with Node.js, and demonstrates using a JWT‑based link to perform a friend‑request operation without requiring the recipient to log in.

AuthenticationBase64JWT
0 likes · 8 min read
Understanding JSON Web Tokens (JWT): Structure, Creation, and Practical Use
Top Architect
Top Architect
Mar 26, 2022 · Information Security

Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview

This article explains the necessity of a unified account management system for enterprise applications, defines key authentication terms, outlines the background and goals of token-based security, details the OAuth2 password‑grant flow with JWT, and discusses technical choices, interface design, and token renewal processes.

JWTMicroservicesOAuth2
0 likes · 9 min read
Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview
IT Architects Alliance
IT Architects Alliance
Mar 21, 2022 · Information Security

OAuth2 and JWT Based Security Authentication Design and Implementation Overview

This article provides a comprehensive overview of a token‑based security authentication system, covering terminology, development background, objectives, functional points, technology selection, OAuth2 grant types, JWT fundamentals, authentication flow, credential renewal, and interface design for unified access control across microservices.

JWTOAuth2access_token
0 likes · 10 min read
OAuth2 and JWT Based Security Authentication Design and Implementation Overview
Top Architect
Top Architect
Mar 15, 2022 · Information Security

Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases

This article explains the fundamental differences between JSON Web Token (JWT) and OAuth2, describes how each works, provides code examples of JWT structure, outlines OAuth2 roles and flows, and discusses practical scenarios, advantages, and drawbacks for securing APIs.

API SecurityAuthenticationAuthorization
0 likes · 12 min read
Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases