Tagged articles
5 articles
Page 1 of 1
Code Ape Tech Column
Code Ape Tech Column
Dec 6, 2020 · Information Security

Token Types, Hierarchies, and Usage Scenarios in Multi‑Client Authentication Systems

This article analyzes various authentication token categories, their natural and controllable attributes, hierarchical relationships, and practical usage scenarios across web, mobile, and API clients, offering a structured approach to improve security, privacy, and manageability in multi‑client information systems.

access controlmulti-client
0 likes · 12 min read
Token Types, Hierarchies, and Usage Scenarios in Multi‑Client Authentication Systems
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Nov 29, 2020 · Information Security

Designing a Multi‑Layer Token Authentication System for Secure Multi‑Client Apps

This article examines the classification, security attributes, and hierarchical design of various authentication tokens for multi‑client systems, offering a layered approach that balances usage cost, change cost, and privacy while outlining practical scenarios and implementation principles.

Identity verificationSecuritySession Management
0 likes · 16 min read
Designing a Multi‑Layer Token Authentication System for Secure Multi‑Client Apps
Architecture Digest
Architecture Digest
Apr 4, 2020 · Information Security

Token Classification and Hierarchical Design for Identity Authentication in Multi‑Client Systems

This article analyses various authentication scenarios in multi‑client information systems, classifies token types such as password, session, access, and QR‑code tokens, compares their natural and controllable attributes, and proposes a four‑layer hierarchical architecture to improve security and manageability.

access controlidentitymulti-client
0 likes · 10 min read
Token Classification and Hierarchical Design for Identity Authentication in Multi‑Client Systems
Top Architect
Top Architect
Mar 2, 2020 · Information Security

Token-Based Authentication: Scenarios, Types, Comparison, and Hierarchical Structure

This article analyses various client scenarios in multi‑client systems, classifies authentication tokens into password, session, API, and other categories, compares them across usage cost, change cost, and security risks, and presents a hierarchical token model with detailed usage steps and practical considerations.

SessionTokenaccess_token
0 likes · 12 min read
Token-Based Authentication: Scenarios, Types, Comparison, and Hierarchical Structure