Tagged articles
15 articles
Page 1 of 1
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Mar 10, 2026 · Backend Development

Implement Multi-Factor Authentication in Spring Boot 3 with One‑Time Tokens

This guide explains how to add MFA to a Spring Boot 3 application using password plus one‑time token authentication, covering the theory of MFA factors, required dependencies, API definitions, security configuration, token‑generation handling, custom login pages, and the complete verification flow with code snippets and screenshots.

JavaMFAmultifactor-authentication
0 likes · 10 min read
Implement Multi-Factor Authentication in Spring Boot 3 with One‑Time Tokens
Java Architecture Diary
Java Architecture Diary
Dec 26, 2025 · Information Security

Secure Your Spring Boot 4 Apps with One Annotation: MFA Made Easy

This article explains how Spring Boot 4.0’s @EnableMultiFactorAuthentication annotation simplifies the implementation of password‑plus‑one‑time‑token multi‑factor authentication, providing step‑by‑step code examples, custom token services, endpoint‑level MFA configuration, and production‑grade considerations.

JavaMFAMulti-Factor Authentication
0 likes · 11 min read
Secure Your Spring Boot 4 Apps with One Annotation: MFA Made Easy
Code Mala Tang
Code Mala Tang
Jul 24, 2025 · Information Security

Boost FastAPI Security: OAuth2, JWT, RBAC, Refresh Tokens & MFA

This guide explains how to secure FastAPI applications using OAuth2 with JWT, role‑based access control, refresh‑token workflows, multi‑factor authentication, and integration with external providers such as Auth0, Keycloak, and Firebase.

AuthenticationFastAPIJWT
0 likes · 9 min read
Boost FastAPI Security: OAuth2, JWT, RBAC, Refresh Tokens & MFA
Ops Development & AI Practice
Ops Development & AI Practice
Jun 29, 2025 · Cloud Computing

Automate Browser‑Based MFA for AWS CLI with Cognito and Credential Process

By leveraging Cognito’s Hosted UI and the OAuth2 Authorization Code Grant, a lightweight local helper launches a temporary web server, opens the browser for MFA login, exchanges the code for tokens, and feeds temporary AWS STS credentials into the AWS CLI via the credential_process feature, delivering a seamless, SSO‑like experience.

AWSCLICognito
0 likes · 8 min read
Automate Browser‑Based MFA for AWS CLI with Cognito and Credential Process
php Courses
php Courses
Jun 18, 2025 · Information Security

Why Most PHP Auth Systems Are Insecure and How to Build a Truly Safe One

This article reveals common security flaws in typical PHP authentication implementations—such as misconceptions about session safety, weak password storage, inadequate CSRF protection, missing rate limiting, and lack of multi‑factor authentication—and provides concrete best‑practice steps, including modern password hashing, strict session management, HTTPS enforcement, comprehensive CSRF defenses, intelligent rate limiting, MFA support, and regular security audits.

CSRFMFAPHP
0 likes · 5 min read
Why Most PHP Auth Systems Are Insecure and How to Build a Truly Safe One
Architecture and Beyond
Architecture and Beyond
Dec 7, 2024 · Information Security

Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations

This article explains the concepts, importance, various forms, and practical implementation details of MFA and 2FA—including the Google Authenticator TOTP mechanism—while also discussing their limitations, costs, and future directions in modern identity security.

2FAAuthenticationGoogle Authenticator
0 likes · 15 min read
Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations
Aikesheng Open Source Community
Aikesheng Open Source Community
Mar 15, 2022 · Databases

Using MySQL 8.0.27 Multi‑Factor Authentication with the authentication_policy Variable

This article explains how MySQL 8.0.27 adds multi‑factor authentication (MFA) via the new authentication_policy system variable, demonstrates configuring the variable, creating users with single or multiple authentication plugins, installing external plugins, and verifies MFA behavior with practical Docker‑based examples.

MFASecurityauthentication_policy
0 likes · 10 min read
Using MySQL 8.0.27 Multi‑Factor Authentication with the authentication_policy Variable
DevOps Cloud Academy
DevOps Cloud Academy
Jun 14, 2021 · Information Security

7 Best Practices for Microservice Security

This article explains how microservice architecture introduces new security challenges and presents seven best‑practice recommendations—including using an API gateway, strong defense layers, DevSecOps, trusted encryption libraries, service‑level security, multi‑factor authentication, and dependency verification—to help protect microservice‑based applications.

Dependency ScanningDevSecOpsMFA
0 likes · 6 min read
7 Best Practices for Microservice Security
DevOps Cloud Academy
DevOps Cloud Academy
Apr 5, 2021 · Information Security

7 Best Practices for Microservice Security

Microservice architectures increase deployment flexibility but also expand the attack surface, so this article outlines seven essential security best practices—including using an API gateway, layered defenses, DevSecOps, trusted encryption libraries, service-level protection, multi-factor authentication, and dependency vulnerability scanning—to safeguard microservice-based applications.

Dependency ScanningDevSecOpsMFA
0 likes · 6 min read
7 Best Practices for Microservice Security
Architects Research Society
Architects Research Society
Sep 21, 2019 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity practices for 2019, covering biometric authentication, tiered security policies, risk‑based approaches, regular backups, IoT security, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing awareness, and employee training.

Data ProtectionMFAbest practices
0 likes · 18 min read
12 Best Cybersecurity Practices for 2019
UCloud Tech
UCloud Tech
Apr 28, 2018 · Operations

Ceph April 2018 Update: New Object, Block, and Cluster Features

The April 2018 Ceph monthly report highlights LTTng tracing for RGW, SSL support for the beast frontend, MFA integration, a notrim option for rbd mapping, runtime lz4 and brotli compression, Zabbix PG metrics, asynchronous dashboard tasks, detailed operation tracking, osdmap pruning, and a new iostat manager plugin.

CephCluster ManagementLTTng
0 likes · 9 min read
Ceph April 2018 Update: New Object, Block, and Cluster Features