Tagged articles
185 articles
Page 1 of 2
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Feb 11, 2026 · Information Security

Mastering Single Sign-On: Cookie, Token, and CAS Approaches Explained

This article explains three core Single Sign-On architectures—same‑domain cookie/session, distributed token‑based (JWT/OAuth2), and Central Authentication Service—detailing their workflows, advantages, drawbacks, and ideal use cases, helping architects choose the right SSO solution for web, mobile, and micro‑service environments.

AuthenticationCASOAuth2
0 likes · 5 min read
Mastering Single Sign-On: Cookie, Token, and CAS Approaches Explained
Tech Freedom Circle
Tech Freedom Circle
Dec 31, 2025 · Information Security

Unified SSO via Gateway: Multi‑App Auth & Authz and JWT vs Auth vs Authz

This article walks through a complete design and implementation of a unified single sign‑on system using OAuth2.0 authorization‑code flow, Spring Cloud Gateway, JWT, Redis, and Nacos, comparing JWT, authentication, and authorization while presenting performance metrics, security considerations, and interview‑ready answers.

AuthenticationAuthorizationJWT
0 likes · 59 min read
Unified SSO via Gateway: Multi‑App Auth & Authz and JWT vs Auth vs Authz
Java Architecture Diary
Java Architecture Diary
Dec 29, 2025 · Information Security

Why Spring Authorization Server Merged into Spring Security 7.0 and How to Migrate

Spring Authorization Server has been integrated into Spring Security 7.0, ending its independent lifecycle; the article explains the three historical eras, the reasons for the merge, and provides concrete dependency and configuration changes—including Lambda DSL updates—to help developers migrate from SpringBoot3 to SpringBoot4 with minimal effort.

Authorization ServerJavaOAuth2
0 likes · 11 min read
Why Spring Authorization Server Merged into Spring Security 7.0 and How to Migrate
Code Wrench
Code Wrench
Dec 20, 2025 · Backend Development

How to Build a High‑Performance Stateless OAuth2 Auth Server in Go

This article walks through a production‑grade OAuth2 authentication center built with Go and Gin, covering a three‑layer architecture, stateless JWT handling, key‑rotation, short‑hash token revocation, high‑availability design, and practical open‑source references.

AuthenticationGoJWT
0 likes · 11 min read
How to Build a High‑Performance Stateless OAuth2 Auth Server in Go
Ray's Galactic Tech
Ray's Galactic Tech
Nov 19, 2025 · Information Security

Mastering Modern Login Mechanisms: Cookies, Sessions, JWT, OAuth2 & SSO

This comprehensive guide explains why authentication is needed for stateless HTTP, walks through the workflows, advantages, and drawbacks of Cookies, Sessions, Tokens, JWTs, Refresh Tokens, blacklist strategies, and OAuth2/OAuth2.1, and provides practical security best‑practice recommendations for web, mobile, and micro‑service architectures.

AuthenticationJWTOAuth2
0 likes · 12 min read
Mastering Modern Login Mechanisms: Cookies, Sessions, JWT, OAuth2 & SSO
Linux Ops Smart Journey
Linux Ops Smart Journey
Oct 28, 2025 · Operations

Enable Keycloak SSO for Nightingale Monitoring with OAuth2/OIDC

This guide walks you through configuring Keycloak as an OAuth2/OIDC identity provider for Nightingale monitoring, covering prerequisites, client and user creation in Keycloak, Nightingale OIDC settings, and verification steps to achieve seamless single sign‑on in enterprise environments.

Identity ManagementKeycloakOAuth2
0 likes · 6 min read
Enable Keycloak SSO for Nightingale Monitoring with OAuth2/OIDC
Su San Talks Tech
Su San Talks Tech
Aug 23, 2025 · Information Security

Cookie, Session, Token, JWT, OAuth2: Which One Fits Your Project?

This article demystifies the differences between Cookie, Session, Token, JWT, and OAuth2, explains their underlying mechanisms, shows practical Spring code examples, compares their security properties and suitable scenarios, and provides clear guidance on choosing the right authentication strategy for modern web applications.

CookieJWTOAuth2
0 likes · 13 min read
Cookie, Session, Token, JWT, OAuth2: Which One Fits Your Project?
Code Mala Tang
Code Mala Tang
Jul 24, 2025 · Information Security

Boost FastAPI Security: OAuth2, JWT, RBAC, Refresh Tokens & MFA

This guide explains how to secure FastAPI applications using OAuth2 with JWT, role‑based access control, refresh‑token workflows, multi‑factor authentication, and integration with external providers such as Auth0, Keycloak, and Firebase.

AuthenticationFastAPIJWT
0 likes · 9 min read
Boost FastAPI Security: OAuth2, JWT, RBAC, Refresh Tokens & MFA
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jul 18, 2025 · Backend Development

How to Enable OpenID Connect in Spring Boot 3: Full Configuration Guide

This guide walks you through configuring Spring Boot 3 with Spring Security OAuth2 Authorization Server to enable OpenID Connect, covering bean setup, client registration, token retrieval, user info customization, and accessing the OpenID configuration endpoint, complete with code examples and essential notes.

Authorization ServerBackendJava
0 likes · 7 min read
How to Enable OpenID Connect in Spring Boot 3: Full Configuration Guide
Ops Development & AI Practice
Ops Development & AI Practice
Jun 29, 2025 · Cloud Computing

Automate Browser‑Based MFA for AWS CLI with Cognito and Credential Process

By leveraging Cognito’s Hosted UI and the OAuth2 Authorization Code Grant, a lightweight local helper launches a temporary web server, opens the browser for MFA login, exchanges the code for tokens, and feeds temporary AWS STS credentials into the AWS CLI via the credential_process feature, delivering a seamless, SSO‑like experience.

AWSCLICognito
0 likes · 8 min read
Automate Browser‑Based MFA for AWS CLI with Cognito and Credential Process
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 10, 2025 · Backend Development

7 Advanced Spring Boot Cases: Resilience4j, Actuator, Cache & More

This article presents seven advanced Spring Boot topics—including Resilience4j circuit breaking, custom Actuator health checks, Saga-based distributed transactions, cache optimization, asynchronous processing, Gateway vs. Zuul, and OAuth2/JWT security—each illustrated with concise explanations, implementation steps, and code samples.

ActuatorCacheOAuth2
0 likes · 11 min read
7 Advanced Spring Boot Cases: Resilience4j, Actuator, Cache & More
php Courses
php Courses
Apr 29, 2025 · Information Security

How to Build an OAuth2 Authorization Code Server in PHP

This article explains the OAuth2 authorization code flow and provides a step‑by‑step guide to creating a PHP‑based authorization server, including installing the bshaffer/oauth2‑server‑php library, writing the server code, setting up the MySQL client table, and testing token requests.

Authorization ServerBackendOAuth2
0 likes · 6 min read
How to Build an OAuth2 Authorization Code Server in PHP
Top Architect
Top Architect
Mar 17, 2025 · Information Security

OAuth 2.0 Overview and Spring Boot Implementation Guide

This article introduces OAuth 2.0 fundamentals, explains its roles and four grant types, and provides a step‑by‑step Spring Boot implementation with configuration classes, code snippets, and testing procedures, while also containing promotional material for AI‑related products and services.

APIAuthenticationOAuth2
0 likes · 12 min read
OAuth 2.0 Overview and Spring Boot Implementation Guide
Top Architect
Top Architect
Mar 16, 2025 · Information Security

OAuth 2.0 Overview and Spring Boot Implementation Guide

This article introduces OAuth 2.0 concepts, roles, and grant types, then provides a step‑by‑step Spring Boot implementation with configuration classes, dependency setup, resource server configuration, test controller code, and demonstrates how to obtain and use access tokens, followed by a series of promotional offers.

AuthorizationOAuth2Security
0 likes · 14 min read
OAuth 2.0 Overview and Spring Boot Implementation Guide
Top Architect
Top Architect
Jan 30, 2025 · Backend Development

OAuth 2.0 Tutorial with Spring Boot Implementation and Testing

This article introduces OAuth 2.0 concepts, explains its roles and grant types, and provides a complete Spring Boot implementation—including configuration classes, dependency setup, and test endpoints—followed by step‑by‑step testing results with screenshots.

AuthenticationBackendOAuth2
0 likes · 13 min read
OAuth 2.0 Tutorial with Spring Boot Implementation and Testing
Eric Tech Circle
Eric Tech Circle
Sep 12, 2024 · Backend Development

Build a Spring Boot 3.x Microservice OAuth2 Authorization Server from Scratch

This guide walks through creating a Spring Boot 3.3.3 microservice permission framework with OAuth2, covering technology stack, core features, project structure, step‑by‑step service startup, token acquisition, API calls, and provides the complete source repository for hands‑on experimentation.

Authorization ServerBackend DevelopmentJava
0 likes · 8 min read
Build a Spring Boot 3.x Microservice OAuth2 Authorization Server from Scratch
Open Source Tech Hub
Open Source Tech Hub
Aug 10, 2024 · Cloud Computing

Integrating Alibaba Cloud Drive API with PHP: Complete Guide and Code Samples

This article explains how to integrate Alibaba Cloud Drive's personal cloud storage capabilities into PHP applications, covering platform overview, OAuth2 authorization flow, essential API endpoints, detailed PHP class implementations, and practical examples for uploading files, managing folders, and retrieving download links.

Alibaba Cloud DriveOAuth2PHP
0 likes · 18 min read
Integrating Alibaba Cloud Drive API with PHP: Complete Guide and Code Samples
Java Tech Enthusiast
Java Tech Enthusiast
Aug 8, 2024 · Information Security

Token Authentication Strategies for Java Microservices

The article compares token‑based authentication options for Java microservices—stateless JWTs, OAuth 2.0 with access and refresh tokens, a centralized API‑gateway authority, and internal service‑to‑service schemes—guiding readers on selecting the best approach according to security, scalability, and business needs.

JWTJavaOAuth2
0 likes · 7 min read
Token Authentication Strategies for Java Microservices
Architect's Guide
Architect's Guide
Jul 27, 2024 · Information Security

Understanding OAuth 2.0: Principles, Architecture, and Implementation

This article explains the OAuth 2.0 authorization framework, its core concepts, architecture, key roles, and implementation patterns for web, user‑agent, and native applications, helping readers grasp how delegated access works without sharing user credentials.

AuthenticationAuthorizationOAuth2
0 likes · 9 min read
Understanding OAuth 2.0: Principles, Architecture, and Implementation
Eric Tech Circle
Eric Tech Circle
Jul 24, 2024 · Backend Development

Designing Secure Microservice Authentication with Spring Boot 3 and OAuth2

This article explains the key changes in Spring Boot 3, outlines the new OAuth2 components, and provides a detailed design for secure microservice authentication and authorization using Spring Authorization Server, JWT, API Gateway, and client applications, complete with architecture diagrams and implementation steps.

AuthenticationAuthorizationBackend
0 likes · 9 min read
Designing Secure Microservice Authentication with Spring Boot 3 and OAuth2
Eric Tech Circle
Eric Tech Circle
Jun 30, 2024 · Information Security

Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide

This article provides a comprehensive walkthrough of Single Sign‑On (SSO) concepts, common protocols, login flow diagrams, and multiple implementation options, then dives into step‑by‑step deployment of an enterprise‑grade SSO system using Keycloak with Docker or Kubernetes, including configuration, client setup, custom extensions, and practical code snippets.

AuthenticationDockerJWT
0 likes · 17 min read
Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide
php Courses
php Courses
Jun 27, 2024 · Information Security

How to Build an OAuth2 Authorization Code Server in PHP

This tutorial explains step‑by‑step how to set up a secure OAuth2 authorization‑code server in PHP, covering the OAuth flow, library installation, server code, database schema, and testing with curl.

APIAuthorization CodeOAuth2
0 likes · 6 min read
How to Build an OAuth2 Authorization Code Server in PHP
php Courses
php Courses
May 16, 2024 · Backend Development

Implementing OAuth2 Single Sign-On (SSO) in Laravel with Passport

This guide walks through integrating OAuth2 Single Sign-On into a Laravel application using Laravel Passport, covering prerequisites, installation steps, configuration of the authentication server and client, testing procedures, and common troubleshooting tips to enhance security and user experience.

LaravelOAuth2PHP
0 likes · 9 min read
Implementing OAuth2 Single Sign-On (SSO) in Laravel with Passport
php Courses
php Courses
Apr 8, 2024 · Information Security

How to Build an OAuth2 Authorization Code Server in PHP

This article explains how to set up an OAuth2 authorization code server using PHP, detailing the OAuth flow, required Composer library, PHP implementation code, MySQL client table creation, and testing steps with example curl requests to obtain access tokens.

APIAuthorization CodeOAuth2
0 likes · 6 min read
How to Build an OAuth2 Authorization Code Server in PHP
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jan 23, 2024 · Information Security

Create a Secure OAuth2 Authorization Server with Spring Boot 3.1 & JDK 17

This guide walks through setting up Spring Authorization Server on Spring Boot 3.1 with JDK 17, covering environment setup, required dependencies, custom security filter chains, in‑memory user and client configurations, JWT signing, endpoint settings, consent service, and step‑by‑step testing of the authorization code flow.

Authorization ServerJavaOAuth2
0 likes · 9 min read
Create a Secure OAuth2 Authorization Server with Spring Boot 3.1 & JDK 17
Java Architect Essentials
Java Architect Essentials
Oct 31, 2023 · Information Security

Understanding Traditional Session Mechanisms, Cluster Session Challenges, and SSO Solutions with CAS and OAuth2

The article explains why multiple independent systems hurt user experience, reviews traditional session and cookie based authentication, discusses session sharing problems in clustered environments, and presents centralized Redis storage and CAS‑based single sign‑on solutions with code examples and a comparison to OAuth2.

CASJavaOAuth2
0 likes · 16 min read
Understanding Traditional Session Mechanisms, Cluster Session Challenges, and SSO Solutions with CAS and OAuth2
Top Architect
Top Architect
Oct 16, 2023 · Information Security

Understanding SSO and OAuth2.0: Concepts, Processes, and Differences

This article explains the fundamentals of Single Sign‑On (SSO) and OAuth2.0, compares their token‑based authentication mechanisms, details typical implementation flows such as CAS, and clarifies the distinctions among SSO, OAuth2, JWT, Spring Security and Shiro, while also noting related promotional content.

CASOAuth2SSO
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Processes, and Differences
MaGe Linux Operations
MaGe Linux Operations
Sep 28, 2023 · Information Security

Mastering JWT: Standard Claims, Custom Tokens, and Renewal Strategies

This article explains JWT payload claims, lists standard and custom claims, shows how to generate a token with expiration in Java, and compares single‑token and double‑token renewal strategies—including OAuth 2.0 approaches and Redis‑based storage—to manage token expiration securely.

AuthenticationJWTJava
0 likes · 5 min read
Mastering JWT: Standard Claims, Custom Tokens, and Renewal Strategies
Architecture Digest
Architecture Digest
Sep 27, 2023 · Information Security

Understanding JWT Claims and Token Renewal Strategies

This article explains the standard JWT claims, shows how to add custom claims with Java code, and compares single‑token and double‑token renewal approaches, including practical examples such as WeChat web authorization and Redis‑based token storage.

JWTOAuth2Security
0 likes · 6 min read
Understanding JWT Claims and Token Renewal Strategies
Architect's Guide
Architect's Guide
Jul 28, 2023 · Information Security

OAuth 2.0 Overview, Authorization Modes, and Implementation for GitHub, QQ, and WeChat Login

This article provides a comprehensive introduction to OAuth 2.0, its core concepts, advantages and disadvantages, details four authorization flows, and presents step‑by‑step Java Spring Boot implementations for GitHub, QQ, and WeChat third‑party login, including database design considerations and code examples.

AuthenticationGitHubJava
0 likes · 21 min read
OAuth 2.0 Overview, Authorization Modes, and Implementation for GitHub, QQ, and WeChat Login
Code Ape Tech Column
Code Ape Tech Column
Jul 7, 2023 · Backend Development

Integrating Redis with Spring Security OAuth2 for Distributed Unified Authentication in the Code Ape Chronic Disease Cloud Management System

This article explains how to replace JWT with a Redis‑backed Spring Security OAuth2 solution, detailing token storage, client types (WEB, PDA, PAD, patient app, mini‑program), password‑mode login requests, encryption of credentials, gateway filters, authentication converters, providers, token generation, persistence in Redis, and success handling, all illustrated with code snippets and diagrams.

Backend DevelopmentOAuth2spring-security
0 likes · 19 min read
Integrating Redis with Spring Security OAuth2 for Distributed Unified Authentication in the Code Ape Chronic Disease Cloud Management System
Sanyou's Java Diary
Sanyou's Java Diary
May 15, 2023 · Information Security

Master OAuth2: From Theory to Hands‑On Implementation with Spring Security

This article explains OAuth2 fundamentals, key terminology, and authorization flows, then guides you through setting up database tables, Spring Boot dependencies, resource and authorization server configurations, multiple grant types, token refresh, permission checks, and common pitfalls, providing complete code snippets and diagrams for a practical implementation.

AuthenticationAuthorization Code FlowBackend Development
0 likes · 17 min read
Master OAuth2: From Theory to Hands‑On Implementation with Spring Security
Programmer DD
Programmer DD
Feb 16, 2023 · Information Security

How to Install Keycloak and Seamlessly Integrate It with Spring Boot and Spring Cloud

This guide walks through downloading, installing, and initializing Keycloak, creating realms, clients, users and roles, then shows step‑by‑step integration with Spring Boot microservices, token propagation via Feign and Zuul, logout handling, email setup, third‑party login, and essential Keycloak terminology.

AuthorizationKeycloakOAuth2
0 likes · 17 min read
How to Install Keycloak and Seamlessly Integrate It with Spring Boot and Spring Cloud
Java High-Performance Architecture
Java High-Performance Architecture
Dec 24, 2022 · Information Security

Master OAuth2 SSO with Spring Security and JWT: A Complete Step‑by‑Step Guide

This tutorial walks through building a single sign‑on (SSO) solution using OAuth2, Spring Security, and JWT in a Java Spring Boot backend, covering preparation, Maven dependencies, server and client configurations, custom login pages, token handling, logout strategies, project structure, and a full demo with source code.

JWTJavaOAuth2
0 likes · 25 min read
Master OAuth2 SSO with Spring Security and JWT: A Complete Step‑by‑Step Guide
Programmer DD
Programmer DD
Dec 13, 2022 · Information Security

How to Build a Low‑Code, Visual RBAC Permission System with Spring Cloud

This article explains how to design a non‑intrusive, easy‑to‑configure, fine‑grained RBAC permission system using OAuth2, JWT, and Spring Cloud micro‑services, covering architecture, expression syntax, URL patterns, and micro‑frontend integration for scalable, maintainable access control.

JWTOAuth2RBAC
0 likes · 13 min read
How to Build a Low‑Code, Visual RBAC Permission System with Spring Cloud
Java High-Performance Architecture
Java High-Performance Architecture
Dec 8, 2022 · Information Security

Unlocking Secure Unified Account Management with Token‑Based OAuth2

This article explains why enterprises need a standardized account management system, outlines the advantages of token‑based authentication over session‑based approaches, and details the OAuth2 and JWT design, workflow, and technical choices for building a scalable, secure, cross‑service authentication solution.

Account ManagementJWTMicroservices
0 likes · 10 min read
Unlocking Secure Unified Account Management with Token‑Based OAuth2
Selected Java Interview Questions
Selected Java Interview Questions
Dec 8, 2022 · Information Security

OAuth2 Overview: Roles, Flow, Client Registration, Grant Types, and Code Samples

This article provides a comprehensive introduction to OAuth2, covering its core concepts, roles, authorization flow, client registration steps, the four grant types (authorization code, implicit, password, client credentials), refresh tokens, and includes practical code snippets and diagrams for better understanding.

Client RegistrationGrant TypesOAuth2
0 likes · 10 min read
OAuth2 Overview: Roles, Flow, Client Registration, Grant Types, and Code Samples
Architecture Digest
Architecture Digest
Nov 25, 2022 · Information Security

Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT

The article explains why enterprises need a unified account management system, defines key authentication terms, outlines the advantages of token‑based security, describes a complete OAuth2 password‑grant flow with JWT, and presents the technical choices and interface designs for implementing a robust, cross‑service authentication solution.

Identity ManagementJWTOAuth2
0 likes · 10 min read
Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT
Code Ape Tech Column
Code Ape Tech Column
Nov 15, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation

This article explains the principles and workflow of Single Sign‑On using OAuth2.0, illustrates the process with a real‑life analogy, and provides a complete Spring Boot example—including authorization server, client configuration, and role‑based access control—suitable for microservice architectures.

AuthenticationAuthorizationMicroservices
0 likes · 12 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation
Code Ape Tech Column
Code Ape Tech Column
Nov 7, 2022 · Information Security

Understanding Session-Based Authentication and Single Sign-On (SSO) with CAS and OAuth2

This article explains the challenges of multiple product systems, reviews traditional session mechanisms and their limitations in clustered environments, compares session replication and centralized storage using Redis, and details the design and implementation of Single Sign-On using CAS and OAuth2 with Java Spring code examples.

CASJavaOAuth2
0 likes · 13 min read
Understanding Session-Based Authentication and Single Sign-On (SSO) with CAS and OAuth2
Java Tech Enthusiast
Java Tech Enthusiast
Oct 21, 2022 · Backend Development

Implementing Third-Party OAuth2 Login with Gitee in Spring Boot

The article walks through registering a Gitee OAuth2 application, building a Spring Boot project with a login page, implementing a controller that exchanges the authorization code for an access token, retrieves user information, and displays the authenticated user's name and avatar on a success page.

GiteeJavaOAuth2
0 likes · 9 min read
Implementing Third-Party OAuth2 Login with Gitee in Spring Boot
IT Architects Alliance
IT Architects Alliance
Oct 11, 2022 · Information Security

Understanding SSO: When to Choose SAML vs OAuth2 & OIDC

This article explains the fundamentals of Single Sign‑On (SSO), compares the two most common protocols—SAML and OAuth2 (with OpenID Connect)—covers their terminology, workflows, benefits, and provides guidance on which to use in different scenarios.

AuthenticationIdentity ManagementOAuth2
0 likes · 10 min read
Understanding SSO: When to Choose SAML vs OAuth2 & OIDC
Top Architect
Top Architect
Sep 30, 2022 · Backend Development

Implementing JWT Blacklist with RedisTokenStore in Spring Security OAuth2

This article explains why JWT is not ideal for logout and token renewal, recommends using a Redis‑backed token store, and provides three Redis‑based blacklist implementations with detailed Java code snippets for extending JwtTokenStore, custom converters, and global filters in Spring Security OAuth2.

JWTJavaOAuth2
0 likes · 12 min read
Implementing JWT Blacklist with RedisTokenStore in Spring Security OAuth2
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Sep 29, 2022 · Information Security

Understanding SSO: When to Use SAML vs OAuth2 & OIDC

This article explains single sign‑on concepts, compares SAML, OAuth2 and OpenID Connect, outlines their benefits and typical workflows, and provides guidance on choosing the right protocol for different security and user‑experience scenarios.

AuthenticationAuthorizationOAuth2
0 likes · 9 min read
Understanding SSO: When to Use SAML vs OAuth2 & OIDC
Top Architect
Top Architect
Sep 25, 2022 · Backend Development

Design and Implementation of a Unified Authentication Center Using Spring Security OAuth2

This article provides a step‑by‑step tutorial on building a unified authentication center with Spring Security OAuth2, covering project module planning, authorization and resource server configuration, client module setup, gateway integration, and custom security components, complete with Maven dependencies and Java code examples.

AuthenticationBackend DevelopmentJava
0 likes · 15 min read
Design and Implementation of a Unified Authentication Center Using Spring Security OAuth2
Selected Java Interview Questions
Selected Java Interview Questions
Sep 20, 2022 · Backend Development

Comprehensive Guide to Building an OAuth2 Authentication Server with Spring Boot, MySQL, Nacos, and Gateway Integration

This tutorial walks through designing an OAuth2 authentication architecture, configuring Spring Boot services, setting up MySQL schemas, integrating Nacos discovery, implementing security with JWT tokens, and connecting microservices through a Spring Cloud Gateway, while demonstrating all four OAuth2 grant types with code examples.

MicroservicesNacosOAuth2
0 likes · 26 min read
Comprehensive Guide to Building an OAuth2 Authentication Server with Spring Boot, MySQL, Nacos, and Gateway Integration
Selected Java Interview Questions
Selected Java Interview Questions
Aug 8, 2022 · Backend Development

Implementing Unified Authorization in Spring Cloud Gateway with OAuth2 Resource Server

This tutorial explains how to centralize URL‑level authentication in a Spring Cloud Gateway by integrating Spring Security OAuth2 Resource Server, defining custom authorization managers, handling token errors, forwarding JWT claims to downstream services, and configuring the gateway with YAML and Java code examples.

MicroservicesOAuth2Security
0 likes · 17 min read
Implementing Unified Authorization in Spring Cloud Gateway with OAuth2 Resource Server
Programmer DD
Programmer DD
Aug 4, 2022 · Backend Development

Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2

This article explains the limitations of traditional HTTP session mechanisms, explores session sharing strategies in clustered environments, and provides a detailed walkthrough of implementing Single Sign-On using CAS, including code samples and a comparison with OAuth2 authentication.

AuthenticationCASJava
0 likes · 18 min read
Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2
Selected Java Interview Questions
Selected Java Interview Questions
Jul 22, 2022 · Backend Development

WeChat Open Platform QR Code Login Integration with Spring Boot

This article explains how to implement WeChat QR code login using OAuth2.0 in a Spring Boot backend, detailing the authorization flow, required configuration, code examples for obtaining access tokens, user authentication, Spring AOP login verification, and exception handling to securely integrate WeChat login into a Java application.

OAuth2QR loginSecurity
0 likes · 11 min read
WeChat Open Platform QR Code Login Integration with Spring Boot
Java Architect Essentials
Java Architect Essentials
Jul 1, 2022 · Information Security

Microservice Authentication and Authorization: Problems, Common Schemes, and a Recommended Solution

This article examines the challenges of microservice authorization and reviews common authentication solutions such as CAS SSO, distributed sessions with gateways, client‑token approaches, and finally proposes a Spring Cloud architecture combining Spring Security, OAuth2, JWT and Zuul for unified access control.

JWTOAuth2Spring Cloud
0 likes · 10 min read
Microservice Authentication and Authorization: Problems, Common Schemes, and a Recommended Solution
Laravel Tech Community
Laravel Tech Community
Jun 29, 2022 · Information Security

Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT

This article describes the challenges of fragmented user management in enterprise applications and presents a unified, standardized account management solution based on token authentication, detailing OAuth2 password flow, JWT usage, system architecture, authorization processes, credential renewal, and interface design for secure, scalable access control.

JWTOAuth2access control
0 likes · 7 min read
Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT
Top Architect
Top Architect
Jun 29, 2022 · Information Security

Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT

This article explains the need for a unified account management platform in enterprises, defines key authentication terms, compares session‑based and token‑based approaches, outlines a complete OAuth2 password‑grant flow with JWT tokens, and discusses technical choices, security features, and interface design for modern microservice architectures.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT
Code Ape Tech Column
Code Ape Tech Column
Jun 20, 2022 · Backend Development

Customizing the Token Response Format in Spring Security OAuth2

This article explains how to override Spring Security OAuth2's default /oauth/token endpoint to return a unified response structure by redefining the TokenEndpoint and optionally the CheckTokenEndpoint, providing complete Java code examples and implementation details.

Backend DevelopmentJavaOAuth2
0 likes · 6 min read
Customizing the Token Response Format in Spring Security OAuth2
Programmer DD
Programmer DD
Jun 14, 2022 · Backend Development

Integrating Enterprise WeChat QR Login with Spring Security OAuth2

This guide walks through configuring Enterprise WeChat QR code authentication in a Spring Security OAuth2 application, covering environment setup, application registration, custom OAuth2 request handling, token exchange, user‑info retrieval, and final authentication handling while highlighting common pitfalls and required code snippets.

Enterprise WeChatJavaOAuth2
0 likes · 9 min read
Integrating Enterprise WeChat QR Login with Spring Security OAuth2
Programmer DD
Programmer DD
Jun 10, 2022 · Information Security

Migrate Spring OAuth to Spring Authorization Server with Java 8

This article explains how to migrate from the deprecated Spring Security OAuth to Spring Authorization Server, covering Java 8 compatibility, extended grant types, Redis token storage, token formatting enhancements, custom authorization code handling, and resource server improvements, all demonstrated on the PIG microservice platform.

Authorization ServerJava 8OAuth2
0 likes · 6 min read
Migrate Spring OAuth to Spring Authorization Server with Java 8
Programmer DD
Programmer DD
Jun 3, 2022 · Backend Development

Spring Security OAuth EOL: Migrate to Spring Security 5.7 & Authorization Server

Spring Security OAuth has reached end‑of‑life, with its documentation removed and code moved to a read‑only Spring attic repository; this guide explains how to detect deprecated dependencies, replace them with Spring Security 5.7’s OAuth2 Client, Resource Server, and the new Spring Authorization Server, ensuring a smooth migration to modern, supported authentication solutions.

BackendJavaOAuth2
0 likes · 7 min read
Spring Security OAuth EOL: Migrate to Spring Security 5.7 & Authorization Server
Programmer DD
Programmer DD
May 27, 2022 · Information Security

What’s New in Spring Authorization Server 0.3.0? Key Features and Changes

Spring Authorization Server 0.3.0 has been officially released, bringing updated documentation, major feature changes such as token customizer relocation, removal of deprecated APIs, dependency upgrades to Spring Boot 2.7.0 and Spring Security 5.7.1, and new contributors, with detailed module overviews and changelog links.

OAuth2Release NotesSecurity
0 likes · 5 min read
What’s New in Spring Authorization Server 0.3.0? Key Features and Changes
IT Architects Alliance
IT Architects Alliance
May 24, 2022 · Information Security

Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT

This document explains the need for a unified account management system in enterprise cloud platforms, defines key terminology, outlines the advantages of token‑based authentication, describes the OAuth2 password‑grant flow and JWT usage, and details the technical design, interface specifications, and credential renewal process for secure cross‑service access.

JWTOAuth2Security
0 likes · 9 min read
Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT
Top Architect
Top Architect
May 23, 2022 · Information Security

Designing a Unified Token‑Based Authentication System Using OAuth2 and JWT

The article explains how to design a unified, token‑based authentication system for enterprise applications, covering OAuth2 password grant, JWT usage, token issuance, validation, renewal processes, and interface design, while highlighting the benefits of stateless security and cross‑service single sign‑on.

JWTOAuth2Security Architecture
0 likes · 10 min read
Designing a Unified Token‑Based Authentication System Using OAuth2 and JWT
Selected Java Interview Questions
Selected Java Interview Questions
May 20, 2022 · Backend Development

Microservice Authentication and Authorization Solutions with Spring Cloud, Spring Security, OAuth2, and JWT

The article explains the challenges of authentication in microservice architectures and compares several solutions—including CAS single sign‑on, distributed session with Redis, client‑side token with JWT, and a recommended Spring Cloud + Spring Security + OAuth2 + JWT approach—detailing their workflows, advantages, and drawbacks.

Backend DevelopmentJWTMicroservices
0 likes · 10 min read
Microservice Authentication and Authorization Solutions with Spring Cloud, Spring Security, OAuth2, and JWT
Programmer DD
Programmer DD
May 15, 2022 · Information Security

Secure Spring Cloud Microservices with the New Spring Authorization Server

This article explains how to replace the deprecated Spring Security OAuth2 with a modern Spring Authorization Server solution, detailing the authentication flow, required components, configuration examples for Spring Cloud Gateway, Resource Server, and Id Server, and provides step‑by‑step demo instructions.

Authorization ServerOAuth2Spring Cloud Gateway
0 likes · 9 min read
Secure Spring Cloud Microservices with the New Spring Authorization Server
Aikesheng Open Source Community
Aikesheng Open Source Community
May 7, 2022 · Databases

SQLE 1.2205.0-pre1 Release Notes: Project Overview, New Features, and Full Release Information

The article introduces the SQLE 1.2205.0-pre1 release, detailing the project's purpose, new capabilities such as OAuth2 login integration and improved MySQL syntax‑error handling, and provides complete release notes, bug fixes, links to documentation, previous versions, and community resources.

Database AuditingOAuth2Release Notes
0 likes · 7 min read
SQLE 1.2205.0-pre1 Release Notes: Project Overview, New Features, and Full Release Information
Java Architect Essentials
Java Architect Essentials
May 4, 2022 · Backend Development

Implementing WeChat QR Code Login with Spring Boot and OAuth2

This article explains how to integrate WeChat QR code login using OAuth2.0 in a Spring Boot backend, covering the authorization flow, required configuration, Java code examples for obtaining the code and access token, user login handling, and AOP-based login verification.

OAuth2QR codeSpring Boot
0 likes · 13 min read
Implementing WeChat QR Code Login with Spring Boot and OAuth2
Programmer DD
Programmer DD
Apr 12, 2022 · Information Security

Secure Microservice Auth with Spring Cloud Gateway & OAuth2

This article explores two common microservice authentication and authorization architectures, compares a dedicated auth server versus gateway‑handled OAuth2 flows, and provides a step‑by‑step implementation using Spring Cloud Gateway, Spring Authorization Server, Spring Security, OpenID Connect, and token relay techniques to secure resources.

MicroservicesOAuth2Spring Cloud Gateway
0 likes · 6 min read
Secure Microservice Auth with Spring Cloud Gateway & OAuth2
Programmer DD
Programmer DD
Mar 29, 2022 · Information Security

Mastering OAuth2 Client Authentication: From client_secret_jwt to TLS Methods

This article explains the classification of OAuth2 clients, details multiple authentication methods—including client_secret_jwt, private_key_jwt, TLS‑based approaches—and provides code examples and best‑practice recommendations for securely authenticating clients in modern OAuth2 deployments.

OAuth2TLSclient authentication
0 likes · 5 min read
Mastering OAuth2 Client Authentication: From client_secret_jwt to TLS Methods
Top Architect
Top Architect
Mar 26, 2022 · Information Security

Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview

This article explains the necessity of a unified account management system for enterprise applications, defines key authentication terms, outlines the background and goals of token-based security, details the OAuth2 password‑grant flow with JWT, and discusses technical choices, interface design, and token renewal processes.

JWTMicroservicesOAuth2
0 likes · 9 min read
Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview
Programmer DD
Programmer DD
Mar 26, 2022 · Information Security

What’s New in Spring Authorization Server 0.2.3? Explore Key Features and Code

Spring Authorization Server 0.2.3 introduces default client settings for public clients, splits OAuth2 client authentication providers, optimizes the in‑memory authorization service, adds federated‑identity demos, unifies token generation via OAuth2TokenGenerator, and upgrades core dependencies, with code examples illustrating each enhancement.

JavaOAuth2Security
0 likes · 7 min read
What’s New in Spring Authorization Server 0.2.3? Explore Key Features and Code
IT Architects Alliance
IT Architects Alliance
Mar 21, 2022 · Information Security

OAuth2 and JWT Based Security Authentication Design and Implementation Overview

This article provides a comprehensive overview of a token‑based security authentication system, covering terminology, development background, objectives, functional points, technology selection, OAuth2 grant types, JWT fundamentals, authentication flow, credential renewal, and interface design for unified access control across microservices.

JWTOAuth2access_token
0 likes · 10 min read
OAuth2 and JWT Based Security Authentication Design and Implementation Overview
Top Architect
Top Architect
Mar 15, 2022 · Information Security

Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases

This article explains the fundamental differences between JSON Web Token (JWT) and OAuth2, describes how each works, provides code examples of JWT structure, outlines OAuth2 roles and flows, and discusses practical scenarios, advantages, and drawbacks for securing APIs.

API SecurityAuthenticationAuthorization
0 likes · 12 min read
Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases
Architecture Digest
Architecture Digest
Mar 14, 2022 · Information Security

Standardized Token‑Based Authentication Architecture Using OAuth2 and JWT for Enterprise Platforms

The article outlines the need for a unified account management system in enterprise platforms and details a token‑based authentication solution using OAuth2 password grant and JWT, describing its advantages, workflow, technical selection, and interface design for secure cross‑service integration.

JWTOAuth2enterprise architecture
0 likes · 9 min read
Standardized Token‑Based Authentication Architecture Using OAuth2 and JWT for Enterprise Platforms
IT Architects Alliance
IT Architects Alliance
Mar 3, 2022 · Information Security

Design and Implementation of a Token-Based Unified Authentication System Using OAuth2 and JWT

This article outlines the design rationale, objectives, and technical choices for a unified, token‑based authentication system based on OAuth2 password grant and JWT, detailing terminology, workflow steps, security benefits, and interface specifications to enable cross‑system single sign‑on and secure access control.

JWTOAuth2Security
0 likes · 8 min read
Design and Implementation of a Token-Based Unified Authentication System Using OAuth2 and JWT
21CTO
21CTO
Mar 3, 2022 · Information Security

How Token‑Based OAuth2 Authentication Powers Secure Enterprise Platforms

This article explains why enterprises need a unified, token‑based OAuth2 authentication system, outlines its advantages over session‑based methods, describes the standard OAuth2 password flow, JWT usage, and details the authorization, authentication, and credential‑renewal processes with architectural diagrams.

JWTOAuth2enterprise security
0 likes · 10 min read
How Token‑Based OAuth2 Authentication Powers Secure Enterprise Platforms
Architect
Architect
Mar 3, 2022 · Information Security

Design and Implementation of Token-Based Authentication Using OAuth2 and JWT

This article explains the necessity of a unified account management system for enterprise applications and details a token‑based authentication solution using OAuth2 password grant and JWT, covering definitions, advantages, workflow steps, technical choices, and interface design for secure microservice integration.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of Token-Based Authentication Using OAuth2 and JWT
Architecture Digest
Architecture Digest
Jan 17, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation

This article explains the principles and workflow of Single Sign-On (SSO) using OAuth2.0, illustrates the process with a real‑life scenario, compares multi‑point and single‑point login, and provides a complete Spring Boot example for building an authorization server, client, and role‑based access control in micro‑service architectures.

AuthenticationAuthorizationMicroservices
0 likes · 10 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation