Tag

OAuth2.0

0 views collected around this technical thread.

Top Architecture Tech Stack
Top Architecture Tech Stack
Mar 31, 2025 · Backend Development

Implementing OAuth2.0 Authentication and Resource Server with Spring Boot

This article explains the fundamentals of OAuth2.0, outlines its roles and grant types, and provides a step‑by‑step Spring Boot implementation—including authorization server, security configuration, resource server, and a test controller—followed by detailed testing procedures and results.

AuthenticationJavaOAuth2.0
0 likes · 10 min read
Implementing OAuth2.0 Authentication and Resource Server with Spring Boot
Code Ape Tech Column
Code Ape Tech Column
Jan 20, 2025 · Backend Development

Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization

This article demonstrates how to integrate Spring Cloud Gateway with OAuth2.0 to build a unified authentication and authorization solution for microservices, covering architecture design, service setup, JWT token handling, custom authentication and authorization managers, exception handling, and end‑to‑end testing.

AuthenticationOAuth2.0Spring Cloud Gateway
0 likes · 10 min read
Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization
Top Architect
Top Architect
Jan 7, 2025 · Backend Development

Implementing OAuth2.0 Authorization and Resource Servers with Spring Boot

This article explains OAuth2.0 fundamentals, outlines its roles and grant types, and provides step‑by‑step Spring Boot code to build an authentication server, configure security, set up a resource server, and test the full authorization flow with token handling.

AuthenticationOAuth2.0Spring Boot
0 likes · 12 min read
Implementing OAuth2.0 Authorization and Resource Servers with Spring Boot
Top Architect
Top Architect
Dec 22, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article provides a comprehensive overview of OAuth2.0, explaining its core concepts, the roles of resource owner, client, authorization server, and resource server, illustrating the full authorization flow with diagrams, clarifying related terminology such as authentication, delegation, and roles, and finally noting additional promotional material.

AuthenticationOAuth2.0SSO
0 likes · 14 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Top Architect
Top Architect
Dec 18, 2024 · Backend Development

OAuth 2.0 Introduction and Spring Boot Implementation Guide

This article provides a comprehensive overview of OAuth 2.0 concepts, grant types, and step‑by‑step instructions for building an authorization server and a resource server using Spring Boot, including configuration classes, token services, security settings, and testing procedures.

JavaOAuth2.0Resource Server
0 likes · 12 min read
OAuth 2.0 Introduction and Spring Boot Implementation Guide
Top Architect
Top Architect
Jul 13, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the OAuth2.0 authorization protocol, distinguishes it from single sign‑on, describes its core entities and step‑by‑step flow, and outlines how web servers, user agents, and native applications interact to securely obtain access tokens for protected resources.

AuthenticationOAuth2.0SSO
0 likes · 12 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Top Architect
Top Architect
Mar 20, 2024 · Information Security

Understanding Single Sign-On (SSO) and OAuth2.0: Types, Implementations, and Frameworks

This article explains how Single Sign-On (SSO) and OAuth2.0 enable seamless authentication across micro‑service applications, compares session‑based, token‑based, OAuth‑based, and SAML‑based SSO approaches, outlines OAuth2.0 grant types, and introduces popular frameworks such as Spring Security OAuth, Keycloak, and Apache Oltu.

AuthenticationBackendOAuth2.0
0 likes · 11 min read
Understanding Single Sign-On (SSO) and OAuth2.0: Types, Implementations, and Frameworks
Selected Java Interview Questions
Selected Java Interview Questions
Mar 20, 2024 · Information Security

Understanding SSO and OAuth2.0: Concepts, Flow, and Differences

This article explains the principles of Single Sign‑On (SSO) and OAuth2.0, compares their workflows, describes the main steps of each protocol, outlines the four OAuth2.0 grant types, and clarifies the distinctions between SSO, OAuth2.0, JWT, and Java security frameworks.

AuthenticationJavaOAuth2.0
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Flow, and Differences
Architecture Digest
Architecture Digest
May 5, 2023 · Information Security

Understanding SSO and OAuth2.0: Concepts, Processes, and Differences

This article explains the principles of Single Sign‑On (SSO) and OAuth2.0, compares their workflows, describes the four OAuth2.0 grant types, and clarifies the distinctions between SSO, OAuth2.0, and Java security frameworks such as Spring Security and Shiro.

AuthenticationJavaOAuth2.0
0 likes · 7 min read
Understanding SSO and OAuth2.0: Concepts, Processes, and Differences
Top Architect
Top Architect
Apr 22, 2023 · Information Security

Understanding SSO and OAuth 2.0: Concepts, Differences, and Implementation

This article explains the principles and workflow of Single Sign‑On (SSO) and OAuth 2.0, compares their concepts, details implementation steps and grant types, and concludes with a promotional invitation to join a community offering related resources and discounts.

AuthenticationBackendOAuth2.0
0 likes · 11 min read
Understanding SSO and OAuth 2.0: Concepts, Differences, and Implementation
Architect's Guide
Architect's Guide
Apr 20, 2023 · Information Security

OAuth 2.0: Principles, Architecture, and Implementation Overview

This article explains the fundamental concepts, roles, and step‑by‑step flow of OAuth 2.0, compares it with single sign‑on, describes the architecture of authorization, resource, and client servers, and clarifies related terminology such as authentication, federation, and delegated access.

APIAuthenticationOAuth2.0
0 likes · 11 min read
OAuth 2.0: Principles, Architecture, and Implementation Overview
Top Architect
Top Architect
Mar 29, 2023 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the roles of resource owner, client, authorization server and resource server, outlines the step‑by‑step authorization flow, and clarifies related terminology such as authentication, federated identity, and delegated authorization.

AuthenticationOAuth2.0Web Development
0 likes · 13 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
IT Architects Alliance
IT Architects Alliance
Nov 22, 2022 · Information Security

Understanding SSO and OAuth2.0: Concepts, Processes, and Differences

This article explains the principles of Single Sign‑On (SSO) and OAuth2.0, compares their workflows, describes common implementation patterns such as CAS and token‑based authentication, and clarifies the distinctions between SSO, OAuth2.0, and related security frameworks.

AuthenticationCASOAuth2.0
0 likes · 7 min read
Understanding SSO and OAuth2.0: Concepts, Processes, and Differences
Architect
Architect
Nov 19, 2022 · Information Security

Understanding SSO and OAuth2.0: Concepts, Differences, and Implementation

This article explains the principles of Single Sign-On (SSO) and OAuth2.0, compares their concepts, outlines typical SSO workflows using CAS, details OAuth2.0 authorization code flow, clarifies terminology differences, and discusses related security frameworks such as Spring Security and Shiro.

AuthenticationOAuth2.0SSO
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Differences, and Implementation
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationJWTOAuth2.0
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
Top Architect
Top Architect
Jun 29, 2022 · Information Security

OAuth 2.0 Protocol Overview and Grant Types

This article provides a comprehensive introduction to the OAuth 2.0 protocol, covering its core concepts, authorization flow, four grant types (authorization code, implicit, resource owner password credentials, client credentials), request and response parameters, token handling, and practical examples with code snippets.

AuthenticationGrant TypesOAuth2.0
0 likes · 22 min read
OAuth 2.0 Protocol Overview and Grant Types
Top Architect
Top Architect
Jun 18, 2022 · Information Security

OAuth 2.0 Protocol Overview and Authorization Flows

This article provides a comprehensive introduction to the OAuth 2.0 protocol, explaining its core concepts, the roles of resource owner, client, authorization server and resource server, and detailing the four grant types—authorization code, implicit, resource‑owner password credentials, and client credentials—along with token request/response formats and refresh token usage.

Grant TypesOAuth2.0Refresh Token
0 likes · 23 min read
OAuth 2.0 Protocol Overview and Authorization Flows
IT Architects Alliance
IT Architects Alliance
Jun 18, 2022 · Information Security

OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types

This article provides a comprehensive introduction to OAuth 2.0, covering its purpose, core roles, token types, four main grant flows (authorization code, implicit, resource‑owner password, client credentials), token refresh mechanisms, and practical request/response examples for developers.

Grant TypesOAuth2.0access token
0 likes · 22 min read
OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types
Top Architect
Top Architect
Mar 8, 2022 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the three main participants, outlines the complete authorization flow with step‑by‑step details, defines key terminology, and discusses deployment scenarios such as web servers, user‑agent apps, and native applications.

APIAuthenticationBackend
0 likes · 11 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Code Ape Tech Column
Code Ape Tech Column
Dec 21, 2021 · Cloud Native

Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization

This article demonstrates how to build a unified authentication and authorization solution by integrating Spring Cloud Gateway with OAuth2.0, covering architecture design, service setup, JWT token handling, custom authentication and authorization managers, Redis-based permission management, and end‑to‑end testing steps.

AuthenticationJWTOAuth2.0
0 likes · 12 min read
Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization