Tagged articles
57 articles
Page 1 of 1
21CTO
21CTO
May 14, 2026 · Industry Insights

Why 157K Developers Turn to OpenCode to Hedge Against Anthropic’s Risks

The article analyzes how Anthropic’s OAuth lock‑down and tighter managed‑agent limits spurred 157,000 developers to adopt the open‑source OpenCode toolchain, weighing vendor‑neutral portability against the integrated power of Claude Code and examining the strategic trade‑offs behind the shift.

AI programmingAnthropicOAuth
0 likes · 14 min read
Why 157K Developers Turn to OpenCode to Hedge Against Anthropic’s Risks
SpringMeng
SpringMeng
Apr 26, 2026 · Backend Development

A 3‑Year‑Proven, Universal Multi‑Account Login Architecture

The article analyzes a company’s three‑year‑old multi‑account unified login system, detailing its original phone‑code design, an optimized password‑optional flow, third‑party OAuth integration, a split user‑basic and user‑auth table schema, and the benefits and trade‑offs of one‑click mobile number authentication.

AuthenticationDatabase designOAuth
0 likes · 13 min read
A 3‑Year‑Proven, Universal Multi‑Account Login Architecture
AI Insight Log
AI Insight Log
Apr 20, 2026 · Information Security

Vercel Breach Reveals How an AI Tool Compromised Env Vars and Led to Data Leak

Vercel confirmed an intrusion where attackers leveraged the third‑party AI service Context.ai to hijack an employee’s Google Workspace OAuth access, gaining entry to internal systems and exposing ordinary environment variables, prompting a rapid public disclosure and a detailed remediation checklist for developers and admins.

AI toolsEnvironment VariablesInfoSec
0 likes · 7 min read
Vercel Breach Reveals How an AI Tool Compromised Env Vars and Led to Data Leak
Black & White Path
Black & White Path
Apr 13, 2026 · Information Security

Cracking a “Fortress” OAuth redirect_uri: A Deep Technical Dive

The article dissects a custom OAuth implementation in a major automotive company's identity system, explains why the redirect_uri is the critical attack surface, and details how systematic fuzzing and a double‑encoding payload ultimately bypass the strict URL validation to hijack user accounts.

OAuthURL fuzzingauthentication vulnerability
0 likes · 13 min read
Cracking a “Fortress” OAuth redirect_uri: A Deep Technical Dive
Black & White Path
Black & White Path
Apr 3, 2026 · Information Security

Cisco Faces New Data Breach Ultimatum After ShinyHunters Exposes FBI, NASA Records

In March 2026, the ShinyHunters ransomware group claimed to have breached Cisco's Salesforce CRM, GitHub repositories, and AWS S3 buckets, stealing over 3 million records that include personnel data from U.S. agencies such as the FBI, DHS, IRS, NASA, as well as Australian and Indian government entities, and issued an ultimatum for Cisco to respond by April 3.

AWSCiscoOAuth
0 likes · 9 min read
Cisco Faces New Data Breach Ultimatum After ShinyHunters Exposes FBI, NASA Records
Architect's Guide
Architect's Guide
Jan 11, 2026 · Information Security

10 Common Authentication Techniques Explained: From Basic Auth to OAuth and QR‑Login

This article systematically introduces ten widely used authentication methods—including HTTP Basic Auth, Session‑Cookie, Token, JWT, Single Sign‑On, OAuth 2.0, federated login, unique‑device login, QR‑code login, and one‑click mobile login—explaining their principles, workflows, advantages, drawbacks, and typical implementation libraries.

AuthenticationJWTOAuth
0 likes · 45 min read
10 Common Authentication Techniques Explained: From Basic Auth to OAuth and QR‑Login
21CTO
21CTO
Dec 1, 2025 · Artificial Intelligence

New Features in Anthropic’s Model Context Protocol: Tasks, OAuth & Security

Celebrating one year since its debut, Anthropic’s Model Context Protocol (MCP) releases a major update that introduces task‑based workflows, URL‑based OAuth client registration, enhanced security requirements, extensible components, and a suite of new features aimed at improving reliability, observability, and developer flexibility.

AIAnthropicMCP
0 likes · 6 min read
New Features in Anthropic’s Model Context Protocol: Tasks, OAuth & Security
21CTO
21CTO
Sep 27, 2025 · Databases

PostgreSQL 18 Unveiled: Async I/O, OAuth Security, and SQL Boosts Explained

PostgreSQL 18 introduces async I/O for faster queries, built‑in OAuth authentication, expanded SQL standard support, optimizer and extension enhancements, and tighter Kubernetes integration, delivering higher performance, stronger security, and greater flexibility for developers and DBAs tackling modern analytics, AI workloads, and distributed environments.

ExtensionsKubernetesOAuth
0 likes · 8 min read
PostgreSQL 18 Unveiled: Async I/O, OAuth Security, and SQL Boosts Explained
Volcano Engine Developer Services
Volcano Engine Developer Services
Aug 27, 2025 · Information Security

How Volcano Engine Secures MCP OAuth: Multi‑Layer Defense Against Token Theft

This article examines the OAuth security challenges in Volcano Engine's Model Context Protocol (MCP) ecosystem and outlines a comprehensive, three‑stage defense strategy—including pre‑authorization double confirmation, token identity isolation, and API‑level permission controls—to protect user assets and data.

Defense in DepthMCPOAuth
0 likes · 13 min read
How Volcano Engine Secures MCP OAuth: Multi‑Layer Defense Against Token Theft
Alibaba Cloud Native
Alibaba Cloud Native
Jun 5, 2025 · Cloud Native

Understanding MCP Auth: OAuth 2.1 Integration and Bearer Authentication for Function Compute

This article explains how the MCP protocol adopts OAuth 2.1, Authorization Server Metadata (RFC 8414), Dynamic Client Registration (RFC 7591) and Protected Resource Metadata (RFC 9728) to provide authentication for MCP services, and shows step‑by‑step how to deploy an MCP server with Bearer authentication on Function Compute, including supergateway configuration.

AuthorizationBearer AuthenticationFunction Compute
0 likes · 15 min read
Understanding MCP Auth: OAuth 2.1 Integration and Bearer Authentication for Function Compute
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
May 4, 2025 · Frontend Development

A Front‑End Developer’s Guide to Integrating WeChat QR‑Code Login

This step‑by‑step tutorial walks front‑end developers through the entire process of integrating WeChat QR‑code login, covering prerequisite checklist, platform setup, core JavaScript SDK usage, callback handling, common pitfalls, security hardening, performance tweaks, debugging tricks, and a learning roadmap.

DebuggingFront-endOAuth
0 likes · 10 min read
A Front‑End Developer’s Guide to Integrating WeChat QR‑Code Login
Open Source Tech Hub
Open Source Tech Hub
Mar 8, 2025 · Backend Development

Integrating EasyWeChat SDK for Secure OAuth in PHP Applications

This guide explains how to install the EasyWeChat PHP SDK via Composer, meet its environment requirements, configure OAuth settings, and implement a complete authorization flow with example code for the Webman framework, including callback handling and a live demo link.

ComposerEasyWeChatOAuth
0 likes · 5 min read
Integrating EasyWeChat SDK for Secure OAuth in PHP Applications
Architect
Architect
Nov 21, 2024 · Information Security

Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth

This article reviews four widely used authentication mechanisms—HTTP Basic Authentication, session‑cookie, token‑based verification (including JWT), and OAuth—explaining their workflows, security characteristics, implementation details with Node.js/Express code samples, and comparative advantages for different application scenarios.

HTTP BasicNode.jsOAuth
0 likes · 18 min read
Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth
Architect
Architect
Jul 10, 2024 · Information Security

Evolution and Design of Login Authentication Systems

This article examines the historical evolution of login authentication technologies, from simple cookie‑based methods to token mechanisms, unified account centers, OAuth 2.0, and modern one‑click solutions, while discussing design considerations, security challenges, and future trends such as AI‑driven identity verification.

Identity ManagementOAuthSecurity
0 likes · 12 min read
Evolution and Design of Login Authentication Systems
Java High-Performance Architecture
Java High-Performance Architecture
May 17, 2024 · Information Security

How MaxKey SSO Delivers Secure, Scalable Single Sign‑On for Enterprises

MaxKey is an enterprise‑grade single sign‑on solution that supports OAuth 2.x, OpenID Connect, SAML 2.0, JWT, CAS and SCIM, offering secure identity management, RBAC, multi‑tenant capabilities, robust password policies, brute‑force protection, session control, and BCrypt‑based password encryption.

AuthenticationIdentity ManagementJava
0 likes · 11 min read
How MaxKey SSO Delivers Secure, Scalable Single Sign‑On for Enterprises
High Availability Architecture
High Availability Architecture
Apr 15, 2024 · Information Security

Evolution and Design of Login Authentication Systems

This article reviews the historical evolution of login authentication—from simple username/password in monolithic apps to token mechanisms, unified account centers, OAuth, and sub‑tokens—while also presenting modern one‑click, trusted‑device, and facial‑verification login methods and future AI‑driven security trends.

OAuthUser experienceidentity
0 likes · 13 min read
Evolution and Design of Login Authentication Systems
Baidu Geek Talk
Baidu Geek Talk
Apr 1, 2024 · Information Security

How Login Authentication Evolved: From Cookies to Tokens and One‑Click Solutions

This article traces the evolution of login authentication—from simple username/password and cookie storage to token‑based, OAuth, and sub‑token architectures—while presenting practical one‑click login methods such as carrier mobile verification, trusted device history, and facial recognition, and it looks ahead to AI‑driven, privacy‑focused identity systems.

Identity ManagementOAuthSecurity
0 likes · 14 min read
How Login Authentication Evolved: From Cookies to Tokens and One‑Click Solutions
Laravel Tech Community
Laravel Tech Community
Sep 14, 2023 · Backend Development

Implementing WeChat OAuth Login with PHP

This article explains how to implement WeChat OAuth login in a PHP web application, detailing required prerequisites, the authorization flow with URL endpoints, and providing a complete PHP function that exchanges the code for an access token, refreshes it if needed, and retrieves the user's nickname and avatar for storage.

OAuthPHPWeChat
0 likes · 5 min read
Implementing WeChat OAuth Login with PHP
Java High-Performance Architecture
Java High-Performance Architecture
Aug 8, 2023 · Information Security

Designing a Scalable Multi‑Account Login System: From Phone Verification to Third‑Party OAuth

This article examines the design of a flexible multi‑account authentication system, covering native phone‑code login, optimized password‑optional flows, third‑party OAuth integration, database schema separation, and one‑click carrier‑based login to improve extensibility and user experience.

BackendDatabase designOAuth
0 likes · 14 min read
Designing a Scalable Multi‑Account Login System: From Phone Verification to Third‑Party OAuth
Java Architecture Diary
Java Architecture Diary
Mar 28, 2023 · Information Security

Understanding OAuth 2.0 Device Authorization Flow (RFC 8628)

OAuth 2.0 Device Authorization (RFC 8628) defines a secure flow for granting access tokens to devices lacking browsers or input capabilities, detailing the roles of client devices, authorization servers, user codes, device codes, polling, and token issuance, illustrated with a TV‑mobile example.

AuthorizationDevice FlowOAuth
0 likes · 3 min read
Understanding OAuth 2.0 Device Authorization Flow (RFC 8628)
Top Architect
Top Architect
Nov 23, 2022 · Information Security

Comprehensive Guide to Front‑End Authentication and Authorization Methods

This article provides an in‑depth overview of authentication, authorization, and permission control concepts and compares ten common front‑end authentication techniques—including HTTP Basic Auth, Session‑Cookie, Token, JWT, SSO, OAuth 2.0, QR‑code login and one‑click login—detailing their workflows, advantages, drawbacks, and typical usage scenarios.

AuthenticationAuthorizationJWT
0 likes · 39 min read
Comprehensive Guide to Front‑End Authentication and Authorization Methods
IT Architects Alliance
IT Architects Alliance
Nov 17, 2022 · Information Security

Comprehensive Guide to Frontend Authentication Methods and Their Differences

This article explains the concepts, relationships, and practical implementations of authentication, authorization, and access control, and compares ten common frontend authentication methods—including HTTP Basic, Session‑Cookie, Token, JWT, SSO, OAuth, and QR‑code login—detailing their workflows, advantages, disadvantages, and suitable scenarios.

JWTOAuthSSO
0 likes · 37 min read
Comprehensive Guide to Frontend Authentication Methods and Their Differences
Top Architect
Top Architect
Nov 4, 2022 · Information Security

Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth

This article reviews four widely used authentication mechanisms—HTTP Basic authentication, session‑cookie based authentication, token (JWT) authentication, and OAuth 2.0—explaining their workflows, security characteristics, and providing Node.js/Express code examples for each.

AuthenticationExpressHTTP Basic
0 likes · 18 min read
Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth
21CTO
21CTO
May 31, 2022 · Information Security

What GitHub’s Latest Leak Reveals About Plaintext Credential Risks

GitHub’s recent security incident, unrelated to OAuth token attacks, exposed over 100,000 npm users' plaintext credentials and detailed private package data, prompting a review of logging practices, notification plans, and broader implications for supply‑chain security.

GitHubOAuthSecurity Breach
0 likes · 5 min read
What GitHub’s Latest Leak Reveals About Plaintext Credential Risks
Baidu Geek Talk
Baidu Geek Talk
Apr 25, 2022 · Information Security

Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC

Baidu’s ToB Account Permission Platform provides a unified, configurable login and permission service—including multi‑tenant account management, SSO, OAuth, and the GD‑RBAC model—delivering secure, high‑performance access for over ten million enterprise accounts across multiple product lines.

AuthenticationAuthorizationBackend
0 likes · 27 min read
Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC
21CTO
21CTO
Apr 18, 2022 · Information Security

How Stolen OAuth Tokens Let Attackers Access Private GitHub Repositories

GitHub revealed that attackers exploited stolen OAuth tokens from third‑party services like Heroku and Travis‑CI to download private repository data, prompting a rapid revocation of tokens and ongoing investigation into the breach.

GitHubHerokuOAuth
0 likes · 3 min read
How Stolen OAuth Tokens Let Attackers Access Private GitHub Repositories
ELab Team
ELab Team
Dec 24, 2021 · Information Security

Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation

This article explores the challenges of cross‑domain login state sharing, compares JWT, session‑cookie, and SSO solutions such as CAS and OAuth, details their structures, security considerations, and provides a step‑by‑step guide to building a simple SSO demo with code snippets and diagrams.

CASJWTOAuth
0 likes · 25 min read
Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation
Top Architect
Top Architect
Dec 7, 2021 · Backend Development

Implementing Token Generation and Validation in a Java Backend Using JWT

This article explains how to generate, store, and validate anti‑duplicate submission tokens in a Java web application by using a custom TokenProcessor, TokenTools utilities, and a JWT‑based OAuthTokenManager, covering both frontend button handling and backend verification logic.

JWTJavaOAuth
0 likes · 12 min read
Implementing Token Generation and Validation in a Java Backend Using JWT
Programmer DD
Programmer DD
Sep 18, 2021 · Backend Development

Simplify Social Logins with JustAuth: A Complete Java Integration Guide

This article introduces JustAuth, a lightweight open‑source Java library that streamlines third‑party social logins by supporting dozens of platforms, explains its benefits for users and developers, and provides step‑by‑step Maven setup, HTTP client selection, and code examples for basic, builder‑pattern, and custom authentication flows.

Backend DevelopmentJavaJustAuth
0 likes · 6 min read
Simplify Social Logins with JustAuth: A Complete Java Integration Guide
Java Architect Essentials
Java Architect Essentials
Mar 3, 2021 · Information Security

Seven Open‑Source OAuth and SSO Projects for Developers

This article introduces seven open‑source OAuth/SSO solutions—including oauth2‑shiro, tkey, MaxKey, spring‑lhbauth, oauth2, oauthserver, and JustAuth—detailing their features, supported protocols, and repository links to help developers implement secure authentication and token management in web and mobile applications.

AuthenticationGolangOAuth
0 likes · 5 min read
Seven Open‑Source OAuth and SSO Projects for Developers
360 Tech Engineering
360 Tech Engineering
Nov 9, 2020 · Information Security

Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth

This article explains the principles and workflows of typical authentication mechanisms—including HTTP Basic authentication, cookie‑based sessions, JSON Web Tokens, and OAuth—detailing their encryption processes, storage strategies, token refresh techniques, and security considerations for modern web applications.

AuthenticationHTTPJWT
0 likes · 12 min read
Guide to Common Authentication Methods: HTTP Auth, Cookie + Session, JWT, and OAuth
php Courses
php Courses
Nov 3, 2020 · Backend Development

Integrating QQ Login with PHP: Step‑by‑Step Guide

This tutorial explains how to integrate QQ third‑party login into a PHP website by obtaining QQ Connect credentials, downloading and configuring the SDK, adding the necessary OAuth code, creating a login button, and handling the callback to retrieve user information.

BackendOAuthPHP
0 likes · 4 min read
Integrating QQ Login with PHP: Step‑by‑Step Guide
Programmer DD
Programmer DD
Sep 4, 2020 · Backend Development

How to Integrate QQ Login in Spring Boot: Step‑by‑Step Guide

This tutorial walks you through registering a QQ Connect application, adding the required Maven dependency, creating the login page, implementing the Spring Boot controller and AuthComment utility class, configuring Freemarker, and handling the OAuth flow to achieve seamless QQ authentication in a Java backend.

AuthenticationBackendOAuth
0 likes · 10 min read
How to Integrate QQ Login in Spring Boot: Step‑by‑Step Guide
Laravel Tech Community
Laravel Tech Community
Sep 2, 2020 · Frontend Development

Obtaining a WeChat User's Nickname in an H5 Page via OAuth Authorization

This tutorial explains how to configure a certified WeChat public account, construct the OAuth authorization URL, exchange the returned code for an access token, retrieve the user's basic profile—including nickname—and redirect back to the H5 page, while covering required parameters and token refresh details.

APIH5JavaScript
0 likes · 7 min read
Obtaining a WeChat User's Nickname in an H5 Page via OAuth Authorization
Architect
Architect
Jul 18, 2020 · Information Security

Understanding OAuth 2.0: Scenarios, Flow, and Implementation Details

This article explains the concept of OAuth, its typical use cases such as third‑party login, the roles of user, service provider, and platform, and provides a step‑by‑step flow with code examples for obtaining authorization codes, access tokens, and user information.

OAuthWeb Developmentaccess_token
0 likes · 11 min read
Understanding OAuth 2.0: Scenarios, Flow, and Implementation Details
Laravel Tech Community
Laravel Tech Community
May 7, 2020 · Backend Development

Implementing Third-Party WeChat Login in Laravel with Socialite

This tutorial walks through installing Laravel Socialite and the WeChat provider, configuring environment and service files, adding routes and controller methods, and handling user authentication to enable seamless third‑party WeChat login in a Laravel application.

BackendLaravelOAuth
0 likes · 4 min read
Implementing Third-Party WeChat Login in Laravel with Socialite
macrozheng
macrozheng
Apr 9, 2020 · Information Security

How QR Code Login Works: Token‑Based Authentication Explained

This article demystifies QR code login by covering what QR codes are, how mobile token‑based authentication works, and the step‑by‑step flow that enables secure PC login via scanning, confirming, and token exchange.

MobileOAuthQR code
0 likes · 8 min read
How QR Code Login Works: Token‑Based Authentication Explained
Java Captain
Java Captain
Sep 25, 2019 · Backend Development

Implementing QQ and Weibo One‑Click Login in a Java Backend

This guide details how to design the backend, database schema, authentication flow, and Java code required to integrate QQ and Weibo one‑click login for a website, covering token handling, user data retrieval, and practical security considerations.

AuthenticationJavaOAuth
0 likes · 14 min read
Implementing QQ and Weibo One‑Click Login in a Java Backend
360 Quality & Efficiency
360 Quality & Efficiency
Aug 15, 2019 · Information Security

Understanding the OAuth Authorization Flow Using a WeChat Login Example

This article explains the OAuth authorization process, illustrating how a third‑party app like a WeChat‑based login requests user permission, obtains a code, exchanges it for an access token, and uses that token to access user data, while highlighting token expiration and business‑scenario applications.

AuthorizationOAuthWeChat
0 likes · 4 min read
Understanding the OAuth Authorization Flow Using a WeChat Login Example
UC Tech Team
UC Tech Team
Nov 16, 2018 · Information Security

Understanding OAuth Authorization Flow and Grant Types

This article explains the OAuth protocol, its role in providing secure third‑party access to user resources, describes the overall authorization architecture, outlines the involved parties and step‑by‑step flow, and details the four main grant types along with token refresh mechanisms.

APIAuthorizationGrant Types
0 likes · 6 min read
Understanding OAuth Authorization Flow and Grant Types
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Oct 30, 2018 · Backend Development

Building an Open API Platform: Core Functions and Design Essentials

This article explains why open platforms emerged, outlines their essential functional modules such as service gateways, management, proxy, security, OAuth, registration, sandbox, and developer portals, and discusses future trends and technology evolution for open API platforms.

MicroservicesOAuthOpen Platform
0 likes · 16 min read
Building an Open API Platform: Core Functions and Design Essentials
Java Architect Essentials
Java Architect Essentials
May 28, 2018 · Information Security

How to Secure RESTful APIs: Authentication, Encryption, and Authorization Strategies

This guide explains the three core pillars of RESTful API security—client authentication, data encryption, and post‑authentication authorization—detailing practical methods such as signature keys, HTTP Basic/Digest, OAuth, SSL, selective encryption with salts, and role‑based access control.

AuthenticationAuthorizationHTTP Digest
0 likes · 4 min read
How to Secure RESTful APIs: Authentication, Encryption, and Authorization Strategies
ITPUB
ITPUB
May 27, 2017 · Databases

Building a High‑Performance OAuth Token Service with Tarantool, Raft, and Sharding

This article explains how we designed and implemented a scalable OAuth token storage and refresh system using Tarantool’s in‑memory database, Raft leader election, sharding across multiple data centers, and a custom lightweight queue to handle high‑throughput token updates while maintaining consistency and fault tolerance.

Distributed SystemsOAuthRaft
0 likes · 20 min read
Building a High‑Performance OAuth Token Service with Tarantool, Raft, and Sharding
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 11, 2016 · Backend Development

Mastering RESTful Architecture: From Resources to OAuth Authentication

This article explains the fundamentals of RESTful architecture—including resources, uniform interfaces, URIs, statelessness—and compares it with ROA, SOA, and RPC, while also covering authentication methods such as Basic, Token, and OAuth, offering practical guidance for building robust microservice APIs.

MicroservicesOAuthRESTful
0 likes · 15 min read
Mastering RESTful Architecture: From Resources to OAuth Authentication