Tagged articles
287 articles
Page 3 of 3
Architecture Digest
Architecture Digest
Mar 14, 2022 · Information Security

Standardized Token‑Based Authentication Architecture Using OAuth2 and JWT for Enterprise Platforms

The article outlines the need for a unified account management system in enterprise platforms and details a token‑based authentication solution using OAuth2 password grant and JWT, describing its advantages, workflow, technical selection, and interface design for secure cross‑service integration.

JWTOAuth2enterprise architecture
0 likes · 9 min read
Standardized Token‑Based Authentication Architecture Using OAuth2 and JWT for Enterprise Platforms
IT Architects Alliance
IT Architects Alliance
Mar 3, 2022 · Information Security

Design and Implementation of a Token-Based Unified Authentication System Using OAuth2 and JWT

This article outlines the design rationale, objectives, and technical choices for a unified, token‑based authentication system based on OAuth2 password grant and JWT, detailing terminology, workflow steps, security benefits, and interface specifications to enable cross‑system single sign‑on and secure access control.

JWTOAuth2Security
0 likes · 8 min read
Design and Implementation of a Token-Based Unified Authentication System Using OAuth2 and JWT
21CTO
21CTO
Mar 3, 2022 · Information Security

How Token‑Based OAuth2 Authentication Powers Secure Enterprise Platforms

This article explains why enterprises need a unified, token‑based OAuth2 authentication system, outlines its advantages over session‑based methods, describes the standard OAuth2 password flow, JWT usage, and details the authorization, authentication, and credential‑renewal processes with architectural diagrams.

JWTOAuth2enterprise security
0 likes · 10 min read
How Token‑Based OAuth2 Authentication Powers Secure Enterprise Platforms
Architect
Architect
Mar 3, 2022 · Information Security

Design and Implementation of Token-Based Authentication Using OAuth2 and JWT

This article explains the necessity of a unified account management system for enterprise applications and details a token‑based authentication solution using OAuth2 password grant and JWT, covering definitions, advantages, workflow steps, technical choices, and interface design for secure microservice integration.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of Token-Based Authentication Using OAuth2 and JWT
Code Ape Tech Column
Code Ape Tech Column
Dec 30, 2021 · Backend Development

Implementing JWT Invalidation with Redis Blacklist in Spring Cloud Gateway

This article explains how to invalidate JWT tokens during password changes, permission updates, or logout by using a Redis-backed blacklist approach in Spring Cloud Gateway, detailing the extraction of the token's jti, gateway filtering, downstream modifications, and a logout endpoint implementation.

AuthenticationBackendJWT
0 likes · 8 min read
Implementing JWT Invalidation with Redis Blacklist in Spring Cloud Gateway
ELab Team
ELab Team
Dec 24, 2021 · Information Security

Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation

This article explores the challenges of cross‑domain login state sharing, compares JWT, session‑cookie, and SSO solutions such as CAS and OAuth, details their structures, security considerations, and provides a step‑by‑step guide to building a simple SSO demo with code snippets and diagrams.

CASJWTOAuth
0 likes · 25 min read
Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation
Sohu Tech Products
Sohu Tech Products
Dec 22, 2021 · Frontend Development

General Architecture Plan for a Vue‑based Backend Management System

This article presents a comprehensive guide to building a generic backend management system with Vue, covering project initialization using Vite or Vue‑CLI, code standards, CSS architecture (ITCSS, BEM, ACSS), JWT authentication, dynamic menu and route generation, RBAC, caching, and component templating.

Frontend ArchitectureJWTRBAC
0 likes · 28 min read
General Architecture Plan for a Vue‑based Backend Management System
Code Ape Tech Column
Code Ape Tech Column
Dec 21, 2021 · Cloud Native

Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization

This article demonstrates how to build a unified authentication and authorization solution by integrating Spring Cloud Gateway with OAuth2.0, covering architecture design, service setup, JWT token handling, custom authentication and authorization managers, Redis-based permission management, and end‑to‑end testing steps.

AuthenticationJWTOAuth2.0
0 likes · 12 min read
Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization
Top Architect
Top Architect
Dec 7, 2021 · Backend Development

Implementing Token Generation and Validation in a Java Backend Using JWT

This article explains how to generate, store, and validate anti‑duplicate submission tokens in a Java web application by using a custom TokenProcessor, TokenTools utilities, and a JWT‑based OAuthTokenManager, covering both frontend button handling and backend verification logic.

JWTJavaOAuth
0 likes · 12 min read
Implementing Token Generation and Validation in a Java Backend Using JWT
Code Ape Tech Column
Code Ape Tech Column
Dec 6, 2021 · Information Security

Integrating OAuth2.0 with JWT in Spring Security – Advanced Tutorial

This article explains how to integrate OAuth2.0 with JWT token issuance in Spring Security, covering transparent vs opaque tokens, server‑side configuration, resource‑server validation, testing with Postman, and key source‑code snippets for a complete end‑to‑end authentication solution.

AuthenticationBackendJWT
0 likes · 9 min read
Integrating OAuth2.0 with JWT in Spring Security – Advanced Tutorial
Code Ape Tech Column
Code Ape Tech Column
Nov 29, 2021 · Information Security

Implementing JWT-Based Authentication and Authorization with Spring Security in a Frontend‑Backend Separated Architecture

This article explains how to use Spring Security together with JWT to build a stateless authentication system for front‑end/back‑end separated applications, covering token issuance, refresh logic, custom filters, handlers, UserDetailsService implementation, global security configuration, and testing procedures.

AuthenticationAuthorizationBackend
0 likes · 12 min read
Implementing JWT-Based Authentication and Authorization with Spring Security in a Frontend‑Backend Separated Architecture
Programmer DD
Programmer DD
Oct 30, 2021 · Backend Development

How to Transform a Monolith into a Spring Cloud OAuth2 Resource Server

This tutorial walks through converting a monolithic Spring application into a Spring Cloud microservice by implementing a JWT‑based OAuth2 resource server, covering required dependencies, custom JWT decoding, key separation, security filter configuration, and token parsing customization.

Backend DevelopmentJWTOAuth2
0 likes · 10 min read
How to Transform a Monolith into a Spring Cloud OAuth2 Resource Server
Programmer DD
Programmer DD
Oct 28, 2021 · Frontend Development

Which Browser Storage Is Best for JWT? Cookie vs localStorage vs sessionStorage

This article compares three browser storage options for JWT—Cookie, localStorage, and sessionStorage—examining how each works, their automatic handling, and security implications such as CSRF and XSS, ultimately recommending Cookies with proper SameSite and HttpOnly settings for stronger protection.

CSRFCookieJWT
0 likes · 4 min read
Which Browser Storage Is Best for JWT? Cookie vs localStorage vs sessionStorage
Programmer DD
Programmer DD
Oct 25, 2021 · Information Security

How to Implement Single Sign‑On with Spring Security and JWT in 30 Minutes

This tutorial walks through the concepts of Single Sign‑On (SSO) and JSON Web Tokens (JWT), then provides a complete Spring Security integration with JWT—including project structure, RSA key handling, utility classes, custom authentication and verification filters, and step‑by‑step testing using Postman.

JWTJavaSSO
0 likes · 19 min read
How to Implement Single Sign‑On with Spring Security and JWT in 30 Minutes
Top Architect
Top Architect
Oct 12, 2021 · Information Security

Implementing JWT Authentication with Spring Boot, Angular, and JJWT

This article explains what JSON Web Tokens are, their structure and security best practices, and demonstrates a complete JWT‑based authentication example using Spring Boot on the backend, the JJWT library, and an Angular front‑end, including Maven configuration, Java filter, controllers, and client‑side code.

AngularAuthenticationJWT
0 likes · 13 min read
Implementing JWT Authentication with Spring Boot, Angular, and JJWT
Java Architect Essentials
Java Architect Essentials
Oct 8, 2021 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, details token types such as access and refresh tokens, introduces JWT principles and usage, and discusses security considerations and distributed session‑sharing strategies for modern web applications.

AuthenticationAuthorizationCookie
0 likes · 22 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT
Top Architect
Top Architect
Sep 26, 2021 · Information Security

Implementing JWT Authentication with Spring Boot and Angular

This article explains what JSON Web Tokens (JWT) are, describes their structure and security considerations, and provides a complete Spring Boot and Angular example—including Maven configuration, Java filter and controller code, Angular services and UI—to demonstrate how to generate, validate, and use JWTs for authentication and role‑based access control.

AngularAuthenticationJWT
0 likes · 14 min read
Implementing JWT Authentication with Spring Boot and Angular
Sohu Tech Products
Sohu Tech Products
Sep 1, 2021 · Frontend Development

Comprehensive Architecture Guide for a Generic Backend Management System Using Vue and Vite

This article presents a detailed architecture solution for building a generic backend management system with Vue, covering project scaffolding choices, Vite configuration, ESLint/Prettier setup, CSS architecture (ITCSS, BEM, ACSS), JWT authentication, dynamic menu design, RBAC, route registration, component caching, and template generation using Plop.

JWTRBACVite
0 likes · 32 min read
Comprehensive Architecture Guide for a Generic Backend Management System Using Vue and Vite
WeDoctor Frontend Technology
WeDoctor Frontend Technology
Sep 1, 2021 · Backend Development

From Cookies to JWT: Mastering Web Session and SSO Strategies

This article explains the evolution from basic web cookies to session management, explores domain sharing, details cookie‑session architecture, introduces single sign‑on methods, and compares the traditional session approach with JWT token authentication, highlighting their advantages, limitations, and implementation considerations.

BackendJWTSSO
0 likes · 16 min read
From Cookies to JWT: Mastering Web Session and SSO Strategies
Top Architect
Top Architect
Aug 11, 2021 · Backend Development

Eight-Step User Authentication with JWT

This article explains an eight‑step JWT‑based user authentication flow, covering secure credential transmission, database verification, token creation, HttpOnly cookie handling, request validation, payload decoding, session versus JWT comparison, and cross‑domain single sign‑on configuration.

AuthenticationJWTSingle Sign-On
0 likes · 5 min read
Eight-Step User Authentication with JWT
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jul 26, 2021 · Information Security

Mastering JWT: Secure API Authentication with Spring Boot

This guide explains the fundamentals of JSON Web Tokens, their structure and claim types, typical use cases such as authorization and secure data exchange, and provides a step‑by‑step Spring Boot implementation including dependency setup, token generation, interceptor validation, and protected endpoint testing.

API SecurityAuthenticationJWT
0 likes · 7 min read
Mastering JWT: Secure API Authentication with Spring Boot
Architecture Digest
Architecture Digest
Jul 20, 2021 · Information Security

Understanding JSON Web Tokens (JWT) and Their Use in Authentication

This article explains the lightweight JWT specification, its three-part structure (header, payload, signature), how to create and encode tokens with example code, the purpose of signatures, security considerations, suitable use cases, and a step‑by‑step authentication flow comparing JWT with traditional session storage.

AuthenticationJWTSecurity
0 likes · 11 min read
Understanding JSON Web Tokens (JWT) and Their Use in Authentication
Top Architect
Top Architect
Jun 15, 2021 · Information Security

Securing Spring Boot Applications with JWT and Spring Security

This tutorial explains how to protect a Spring Boot web application by integrating Spring Security and JSON Web Tokens (JWT), covering project setup, dependency configuration, custom authentication components, security filters, token generation, role‑based access control, and testing with curl commands.

AuthenticationJWTJava
0 likes · 15 min read
Securing Spring Boot Applications with JWT and Spring Security
macrozheng
macrozheng
Jun 9, 2021 · Information Security

Secure API Authentication: Token vs Signature with Java Code

This article compares token-based and signature-based API authentication methods, discusses their advantages and drawbacks, and provides complete Java code examples—including JWT token utilities, authentication interceptors, and signature verification—to help developers implement robust API security in real-world projects.

API SecurityHTTPSJWT
0 likes · 13 min read
Secure API Authentication: Token vs Signature with Java Code
Programmer DD
Programmer DD
May 20, 2021 · Information Security

Mastering JWT Bearer Grant in Spring Security 5.5 for OAuth2.0

Spring Security 5.5 introduces the JWT Bearer grant, an OAuth2.0 authorization mode defined in RFC7523, allowing clients to obtain access tokens using trusted JWTs and also to authenticate themselves, offering a streamlined alternative to traditional user‑approval flows.

AuthenticationJWTOAuth2
0 likes · 6 min read
Mastering JWT Bearer Grant in Spring Security 5.5 for OAuth2.0
Top Architect
Top Architect
Apr 20, 2021 · Information Security

Integrating JWT Authentication in Spring Boot

This article explains the fundamentals of JSON Web Tokens (JWT), their structure, main use cases, and provides a step‑by‑step guide for integrating JWT authentication into a Spring Boot application, including dependency setup, custom annotations, token generation, interceptor implementation, and configuration details.

AuthenticationJWTJava
0 likes · 16 min read
Integrating JWT Authentication in Spring Boot
Architects Research Society
Architects Research Society
Mar 27, 2021 · Backend Development

Understanding API Gateways and Their Role in Microservice Architectures

This article explains what API gateways are, why they are essential in microservice architectures, and how they address cross‑cutting concerns such as authentication, transport security, load balancing, request routing, dependency resolution, and data transformation, illustrated with a Node.js example.

AuthenticationJWTMicroservices
0 likes · 12 min read
Understanding API Gateways and Their Role in Microservice Architectures
21CTO
21CTO
Mar 9, 2021 · Backend Development

Mastering OAuth2 SSO with Spring Security and JWT: A Step‑by‑Step Guide

This tutorial walks through building a single sign‑on (SSO) system using OAuth2, Spring Security, and JWT, covering preparation, core concepts, Maven dependencies, configuration files, custom login pages, client setup, logout handling, project structure, and a full demonstration.

AuthenticationBackendJWT
0 likes · 25 min read
Mastering OAuth2 SSO with Spring Security and JWT: A Step‑by‑Step Guide
Top Architect
Top Architect
Feb 28, 2021 · Information Security

Comparison of JWT and OAuth2: Concepts, Implementation, and Use Cases

This article explains the fundamental differences between JSON Web Token (JWT) and OAuth2, describes their structures, security considerations, implementation details, and outlines appropriate scenarios for using each method to protect APIs.

AuthenticationAuthorizationJWT
0 likes · 10 min read
Comparison of JWT and OAuth2: Concepts, Implementation, and Use Cases
Architecture Digest
Architecture Digest
Feb 5, 2021 · Information Security

Token-Based Authentication Architecture Using OAuth2 and JWT

The article explains the design and implementation of a token‑based authentication system for micro‑services, covering terminology, business background, OAuth2 password‑grant flow, JWT usage, security advantages, functional modules, technical choices, detailed authentication workflow, and API design.

JWTMicroservicesOAuth2
0 likes · 10 min read
Token-Based Authentication Architecture Using OAuth2 and JWT
21CTO
21CTO
Feb 2, 2021 · Information Security

JWT vs OAuth2: Which Authentication Method Is Right for Your API?

This article explains the fundamental differences between JSON Web Tokens (JWT) and OAuth2, outlines their structures, security considerations, implementation details, and compares their advantages, drawbacks, and suitable use cases to help developers choose the appropriate method for securing APIs.

API SecurityAuthorizationJWT
0 likes · 10 min read
JWT vs OAuth2: Which Authentication Method Is Right for Your API?
Code Ape Tech Column
Code Ape Tech Column
Feb 2, 2021 · Information Security

JWT vs OAuth2: Which API Security Method Fits Your Needs?

This article explains the fundamental differences between JSON Web Tokens (JWT) and OAuth 2.0, outlines their structures, roles, and grant types, compares implementation effort and risk, and provides guidance on choosing the right approach for various API security scenarios.

API SecurityAuthenticationAuthorization
0 likes · 11 min read
JWT vs OAuth2: Which API Security Method Fits Your Needs?
Code Ape Tech Column
Code Ape Tech Column
Jan 26, 2021 · Backend Development

Step‑by‑Step Guide to Building SSO with JWT and Spring Security

This tutorial explains the concept of Single Sign‑On, demonstrates a simple ticket‑based analogy, introduces JWT structure and RSA signing, and walks through a complete Spring Boot implementation—including project layout, Maven dependencies, configuration files, utility classes, custom authentication and verification filters, security configuration, and Postman testing—so readers can build a secure SSO service from scratch.

AuthenticationAuthorizationJWT
0 likes · 25 min read
Step‑by‑Step Guide to Building SSO with JWT and Spring Security
Senior Brother's Insights
Senior Brother's Insights
Nov 22, 2020 · Backend Development

Prevent Duplicate Submissions with JWT Tokens in a Java Backend

This article explains how to use JWT tokens in a Java backend to prevent duplicate form submissions, covering the problem of repeated clicks, two mitigation approaches, detailed token generation utilities, session handling methods, and practical code examples for creating, validating, and managing tokens.

BackendJWTJava
0 likes · 12 min read
Prevent Duplicate Submissions with JWT Tokens in a Java Backend
360 Tech Engineering
360 Tech Engineering
Nov 9, 2020 · Information Security

Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth

This article explains the principles and workflows of typical authentication mechanisms—including HTTP Basic authentication, cookie‑based sessions, JSON Web Tokens, and OAuth—detailing their encryption processes, storage strategies, token refresh techniques, and security considerations for modern web applications.

AuthenticationHTTPJWT
0 likes · 12 min read
Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth
Top Architect
Top Architect
Oct 30, 2020 · Backend Development

Implementing Login Authentication with Session and JWT in Spring Boot

This article provides a step‑by‑step guide to implementing login authentication in Spring Boot, covering both session‑based and JWT‑based approaches, including code for controllers, filters, interceptors, context utilities, and best‑practice considerations for secure and scalable backend development.

JWTJavaSecurity
0 likes · 22 min read
Implementing Login Authentication with Session and JWT in Spring Boot
Top Architect
Top Architect
Sep 9, 2020 · Backend Development

Implementing JWT Token Refresh in Spring Boot OAuth2

This article explains how to implement seamless JWT token refresh in a Spring Boot OAuth2 application by embedding refresh information into the access token, customizing token services, defining a token refresh executor, and handling the refreshed token on the front‑end with an Axios interceptor.

JWTOAuth2Spring Boot
0 likes · 15 min read
Implementing JWT Token Refresh in Spring Boot OAuth2
macrozheng
macrozheng
Sep 1, 2020 · Information Security

Why JWT Is Both Loved and Criticized: A Deep Dive into Token Authentication

This article compares traditional cookie‑session authentication with JWT, explains JWT’s three‑part structure, shows how to generate and verify tokens in Java, and discusses security benefits, pitfalls, and practical considerations for modern web and mobile applications.

JWTJavaSecurity
0 likes · 14 min read
Why JWT Is Both Loved and Criticized: A Deep Dive into Token Authentication
Java Captain
Java Captain
Jul 26, 2020 · Information Security

Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT

This article explains the fundamentals of authentication and authorization, the roles of credentials, cookies, sessions, various token types including access and refresh tokens, and details the structure, generation, and usage of JWTs, while comparing security considerations and distributed session sharing strategies.

AuthenticationAuthorizationCookie
0 likes · 21 min read
Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT
Top Architect
Top Architect
Jul 3, 2020 · Backend Development

SpringBoot Scaffold Project with JWT and Shiro: Features, Setup, and Usage Guide

This article introduces a SpringBoot-based scaffold project that integrates JWT authentication and Apache Shiro authorization, outlines its key features such as custom annotations, bcrypt password encryption, and AOP transaction handling, and provides step‑by‑step instructions for setup, configuration, and running the application.

BackendJWTJava
0 likes · 6 min read
SpringBoot Scaffold Project with JWT and Shiro: Features, Setup, and Usage Guide
Laravel Tech Community
Laravel Tech Community
Apr 20, 2020 · Backend Development

Implementing JWT Authentication API in Laravel

This guide walks through installing the tymon/jwt-auth package, configuring Laravel, creating middleware for CORS and JWT verification, defining API routes, building an authentication controller, and testing the registration and login endpoints using tools like Postman or AJAX.

APIAuthenticationBackend
0 likes · 7 min read
Implementing JWT Authentication API in Laravel
macrozheng
macrozheng
Apr 10, 2020 · Backend Development

Understanding Cookies, Sessions, and JWT: A Complete Guide to Web Authentication

This article explains how cookies and sessions compensate for HTTP's stateless nature, details their creation, types, and limitations, compares them with JSON Web Tokens, and provides guidance on choosing the appropriate authentication method for different application scales and security requirements.

AuthenticationJWTSession
0 likes · 16 min read
Understanding Cookies, Sessions, and JWT: A Complete Guide to Web Authentication
MaGe Linux Operations
MaGe Linux Operations
Feb 24, 2020 · Information Security

Session vs JWT: When to Choose Token‑Based Authentication

This article explains the differences between authentication and authorization, compares session‑based and token‑based (JWT) authentication flows, details JWT structure and signing, and outlines the advantages, disadvantages, and suitable scenarios for each method.

AuthenticationBackendJWT
0 likes · 9 min read
Session vs JWT: When to Choose Token‑Based Authentication
Java Captain
Java Captain
Feb 19, 2020 · Information Security

Stateless Login Principle and Implementation Using JWT and RSA

The article explains the drawbacks of stateful authentication, defines stateless services, describes a token‑based login flow using JWT with RSA asymmetric encryption, and shows how to integrate this approach into a Zuul‑based microservice architecture to achieve scalable, secure, and session‑free authentication.

JWTRSAStateless Authentication
0 likes · 9 min read
Stateless Login Principle and Implementation Using JWT and RSA
Architecture Digest
Architecture Digest
Jan 8, 2020 · Information Security

Security Authentication and Authorization Strategies for Microservice Architecture

This article examines the evolution from monolithic to microservice architectures and presents various authentication and authorization solutions—including SSO, distributed sessions, client tokens, JWT, and OAuth 2.0—highlighting their principles, advantages, and practical considerations for securing inter‑service and external access.

JWTMicroservicesOAuth2
0 likes · 19 min read
Security Authentication and Authorization Strategies for Microservice Architecture
Java High-Performance Architecture
Java High-Performance Architecture
Dec 27, 2019 · Information Security

Why Basic Auth Fails and How OAuth2+JWT Secures Modern REST APIs

An overview of three RESTful web service security approaches—Basic authentication, OAuth 2.0, and OAuth 2.0 combined with JWT—examining their mechanisms, scalability drawbacks, and why JWT‑based solutions offer superior extensibility for micro‑service architectures, illustrated with Amazon’s token‑signing method.

JWTOAuth2Security
0 likes · 5 min read
Why Basic Auth Fails and How OAuth2+JWT Secures Modern REST APIs
Open Source Tech Hub
Open Source Tech Hub
Dec 11, 2019 · Information Security

Why Choose JWT? Mastering Access and Refresh Tokens for Secure APIs

This article explains why JWT has become the preferred method for session management in modern RESTful and SPA architectures, detailing the roles, lifecycles, and implementation steps of access_token and refresh_token, and providing concrete API examples for login and token renewal.

API authenticationJWTRefresh token
0 likes · 6 min read
Why Choose JWT? Mastering Access and Refresh Tokens for Secure APIs
Programmer DD
Programmer DD
Dec 10, 2019 · Backend Development

Master JWT Authentication in Spring Security: From Basics to Implementation

This guide walks you through the various HTTP authentication methods, explains JWT Bearer authentication, and demonstrates how to implement a custom JwtAuthenticationFilter in Spring Security, configure it, and use JWT tokens for securing API endpoints, including token refresh handling.

AuthenticationBackendJWT
0 likes · 15 min read
Master JWT Authentication in Spring Security: From Basics to Implementation
Senior Brother's Insights
Senior Brother's Insights
Nov 21, 2019 · Information Security

Is JWT the Silver Bullet? Understanding Its Mechanics, Benefits, and Pitfalls

JWT (JSON Web Token) is a compact, URL‑safe means of representing claims between parties, widely adopted for stateless authentication, but it has limitations; this article explains JWT fundamentals, creation and verification in Java, compares its advantages over sessions, and outlines security risks and mitigation strategies.

JWTJavaSecurity
0 likes · 16 min read
Is JWT the Silver Bullet? Understanding Its Mechanics, Benefits, and Pitfalls
Programmer DD
Programmer DD
Jul 10, 2019 · Information Security

Why JWT Is the Modern Alternative to Session Cookies for Secure Web Apps

This article explains how traditional session‑cookie authentication creates scalability, security, and deployment challenges in front‑end/back‑end separated web applications, and how JSON Web Tokens (JWT) provide a compact, self‑contained, stateless solution while also outlining their advantages and limitations.

JWTSessionToken
0 likes · 7 min read
Why JWT Is the Modern Alternative to Session Cookies for Secure Web Apps
Java Architecture Diary
Java Architecture Diary
Mar 19, 2019 · Information Security

Eliminate OAuth2 Check‑Token Bottleneck with JWT and Custom Token Services

This article explains how the default OAuth2 check‑token flow creates a performance bottleneck, then shows how to extend JWT tokens with user details via a custom TokenEnhancer and replace RemoteTokenServices with a custom ResourceServerTokenServices, including configuration, code examples, and the security trade‑offs of using JWT.

JWTOAuth2Resource Server
0 likes · 7 min read
Eliminate OAuth2 Check‑Token Bottleneck with JWT and Custom Token Services
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Dec 4, 2018 · Information Security

How to Secure Microservices: From SSO to JWT and OAuth2 Explained

This article explores the evolution of authentication and authorization from monolithic to microservice architectures, comparing traditional session-based methods with modern token solutions like JWT and OAuth2, and provides practical guidance on implementing secure, scalable access control across dozens of services.

AuthorizationJWTMicroservices
0 likes · 18 min read
How to Secure Microservices: From SSO to JWT and OAuth2 Explained
Programmer DD
Programmer DD
Apr 23, 2018 · Information Security

When Should You Really Use JWT? Practical Insights and Common Pitfalls

This article explains JWT fundamentals—encoding, signature, and encryption—examines suitable use‑cases such as one‑time verification and stateless API authentication, discusses token leakage, secret design, logout handling, renewal strategies, and compares JWT with traditional session and OAuth2 approaches.

JWTOAuth2Session
0 likes · 15 min read
When Should You Really Use JWT? Practical Insights and Common Pitfalls
Programmer DD
Programmer DD
Apr 18, 2018 · Information Security

Mastering JWT-Based User Authentication: An 8‑Step Guide

This article walks through an eight‑step JWT authentication flow, explaining how to securely transmit user IDs via cookies, verify tokens on each request, compare JWT with traditional session storage, and configure domain‑wide cookies for single sign‑on across subdomains.

AuthenticationCookieJWT
0 likes · 7 min read
Mastering JWT-Based User Authentication: An 8‑Step Guide
Programmer DD
Programmer DD
Apr 16, 2018 · Information Security

How JWT Enables Secure, Login‑Free Friend Requests in Web Apps

This article explains the JSON Web Token (JWT) format, its three-part structure, how to encode a payload and header with Base64, sign the token using HS256, and apply the resulting JWT to a friend‑request scenario that works without requiring the recipient to log in.

Base64JSON Web TokenJWT
0 likes · 8 min read
How JWT Enables Secure, Login‑Free Friend Requests in Web Apps
Java Backend Technology
Java Backend Technology
Jan 31, 2018 · Information Security

Why JWT Is Replacing Cookies for Stateless Web Authentication

This article explains HTTP's stateless nature, how cookies and server‑side sessions try to overcome it, the challenges of session sharing in clustered environments, and why JSON Web Tokens (JWT) provide a lightweight, secure, and scalable alternative for modern authentication.

AuthenticationJWTSession
0 likes · 14 min read
Why JWT Is Replacing Cookies for Stateless Web Authentication
Architecture Digest
Architecture Digest
Sep 5, 2017 · Information Security

Security Authentication and Authorization Strategies for Microservice Architecture

This article examines the challenges of securing microservice architectures and compares various authentication and authorization approaches—including SSO, distributed sessions, client‑token schemes, JWT, and OAuth 2.0—to help developers choose suitable solutions for efficient and fine‑grained access control.

AuthenticationAuthorizationJWT
0 likes · 15 min read
Security Authentication and Authorization Strategies for Microservice Architecture