Tagged articles
30 articles
Page 1 of 1
Lobster Programming
Lobster Programming
Dec 23, 2025 · Information Security

Understanding the Difference Between SSO and OAuth2.0: Authentication vs Authorization

SSO (Single Sign‑On) and OAuth2.0 are both widely used identity frameworks; SSO handles user authentication across multiple applications with a single login, while OAuth2.0 is an authorization protocol that lets users grant third‑party apps limited access to resources without sharing passwords.

AuthenticationAuthorizationIdentity Management
0 likes · 6 min read
Understanding the Difference Between SSO and OAuth2.0: Authentication vs Authorization
Code Ape Tech Column
Code Ape Tech Column
Jan 20, 2025 · Backend Development

Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization

This article demonstrates how to integrate Spring Cloud Gateway with OAuth2.0 to build a unified authentication and authorization solution for microservices, covering architecture design, service setup, JWT token handling, custom authentication and authorization managers, exception handling, and end‑to‑end testing.

AuthenticationOAuth2.0
0 likes · 10 min read
Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization
Top Architect
Top Architect
Jan 7, 2025 · Backend Development

Implementing OAuth2.0 Authorization and Resource Servers with Spring Boot

This article explains OAuth2.0 fundamentals, outlines its roles and grant types, and provides step‑by‑step Spring Boot code to build an authentication server, configure security, set up a resource server, and test the full authorization flow with token handling.

Backend DevelopmentOAuth2.0Spring Boot
0 likes · 12 min read
Implementing OAuth2.0 Authorization and Resource Servers with Spring Boot
Top Architect
Top Architect
Dec 22, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article provides a comprehensive overview of OAuth2.0, explaining its core concepts, the roles of resource owner, client, authorization server, and resource server, illustrating the full authorization flow with diagrams, clarifying related terminology such as authentication, delegation, and roles, and finally noting additional promotional material.

AuthorizationOAuth2.0SSO
0 likes · 14 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Top Architect
Top Architect
Dec 18, 2024 · Backend Development

OAuth 2.0 Introduction and Spring Boot Implementation Guide

This article provides a comprehensive overview of OAuth 2.0 concepts, grant types, and step‑by‑step instructions for building an authorization server and a resource server using Spring Boot, including configuration classes, token services, security settings, and testing procedures.

Authorization ServerBackend DevelopmentJava
0 likes · 12 min read
OAuth 2.0 Introduction and Spring Boot Implementation Guide
大转转FE
大转转FE
Aug 23, 2024 · Information Security

How OAuth2.0 Powers Third‑Party Login: From WeChat to Secure Token Flows

This article explains third‑party authorization login, using WeChat as a concrete example, and provides a detailed walkthrough of the OAuth2.0 protocol, its roles, grant types, token handling, and implementation steps for mobile and web applications.

Authorization CodeOAuth2.0Security
0 likes · 24 min read
How OAuth2.0 Powers Third‑Party Login: From WeChat to Secure Token Flows
Top Architect
Top Architect
Jul 13, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the OAuth2.0 authorization protocol, distinguishes it from single sign‑on, describes its core entities and step‑by‑step flow, and outlines how web servers, user agents, and native applications interact to securely obtain access tokens for protected resources.

AuthenticationAuthorizationBackend Development
0 likes · 12 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Top Architect
Top Architect
Mar 20, 2024 · Information Security

Understanding Single Sign-On (SSO) and OAuth2.0: Types, Implementations, and Frameworks

This article explains how Single Sign-On (SSO) and OAuth2.0 enable seamless authentication across micro‑service applications, compares session‑based, token‑based, OAuth‑based, and SAML‑based SSO approaches, outlines OAuth2.0 grant types, and introduces popular frameworks such as Spring Security OAuth, Keycloak, and Apache Oltu.

OAuth2.0SSOSecurity
0 likes · 11 min read
Understanding Single Sign-On (SSO) and OAuth2.0: Types, Implementations, and Frameworks
Programmer DD
Programmer DD
Apr 24, 2023 · Information Security

Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works

This article explains the concepts, workflows, and key differences between Single Sign‑On (SSO) and OAuth2.0, illustrating how token‑based authentication replaces passwords, detailing typical CAS‑based SSO steps, OAuth2.0 authorization‑code flow, and clarifying related terminology and grant types.

AuthorizationCASOAuth2.0
0 likes · 9 min read
Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works
Architect's Guide
Architect's Guide
Apr 20, 2023 · Information Security

OAuth 2.0: Principles, Architecture, and Implementation Overview

This article explains the fundamental concepts, roles, and step‑by‑step flow of OAuth 2.0, compares it with single sign‑on, describes the architecture of authorization, resource, and client servers, and clarifies related terminology such as authentication, federation, and delegated access.

APIAuthenticationOAuth2.0
0 likes · 11 min read
OAuth 2.0: Principles, Architecture, and Implementation Overview
Top Architect
Top Architect
Mar 29, 2023 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the roles of resource owner, client, authorization server and resource server, outlines the step‑by‑step authorization flow, and clarifies related terminology such as authentication, federated identity, and delegated authorization.

AuthenticationAuthorizationOAuth2.0
0 likes · 13 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Architect
Architect
Nov 19, 2022 · Information Security

Understanding SSO and OAuth2.0: Concepts, Differences, and Implementation

This article explains the principles of Single Sign-On (SSO) and OAuth2.0, compares their concepts, outlines typical SSO workflows using CAS, details OAuth2.0 authorization code flow, clarifies terminology differences, and discusses related security frameworks such as Spring Security and Shiro.

AuthenticationOAuth2.0SSO
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Differences, and Implementation
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationAuthorizationJWT
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
Top Architect
Top Architect
Jun 29, 2022 · Information Security

OAuth 2.0 Protocol Overview and Grant Types

This article provides a comprehensive introduction to the OAuth 2.0 protocol, covering its core concepts, authorization flow, four grant types (authorization code, implicit, resource owner password credentials, client credentials), request and response parameters, token handling, and practical examples with code snippets.

AuthenticationAuthorizationGrant Types
0 likes · 22 min read
OAuth 2.0 Protocol Overview and Grant Types
Top Architect
Top Architect
Jun 18, 2022 · Information Security

OAuth 2.0 Protocol Overview and Authorization Flows

This article provides a comprehensive introduction to the OAuth 2.0 protocol, explaining its core concepts, the roles of resource owner, client, authorization server and resource server, and detailing the four grant types—authorization code, implicit, resource‑owner password credentials, and client credentials—along with token request/response formats and refresh token usage.

AuthorizationGrant TypesOAuth2.0
0 likes · 23 min read
OAuth 2.0 Protocol Overview and Authorization Flows
IT Architects Alliance
IT Architects Alliance
Jun 18, 2022 · Information Security

OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types

This article provides a comprehensive introduction to OAuth 2.0, covering its purpose, core roles, token types, four main grant flows (authorization code, implicit, resource‑owner password, client credentials), token refresh mechanisms, and practical request/response examples for developers.

AuthorizationGrant TypesOAuth2.0
0 likes · 22 min read
OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types
Top Architect
Top Architect
Mar 8, 2022 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the three main participants, outlines the complete authorization flow with step‑by‑step details, defines key terminology, and discusses deployment scenarios such as web servers, user‑agent apps, and native applications.

APIAuthenticationAuthorization
0 likes · 11 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Code Ape Tech Column
Code Ape Tech Column
Dec 21, 2021 · Cloud Native

Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization

This article demonstrates how to build a unified authentication and authorization solution by integrating Spring Cloud Gateway with OAuth2.0, covering architecture design, service setup, JWT token handling, custom authentication and authorization managers, Redis-based permission management, and end‑to‑end testing steps.

AuthenticationJWTOAuth2.0
0 likes · 12 min read
Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization
FunTester
FunTester
Jun 12, 2020 · Mobile Development

WeChat OAuth2.0 Mobile Application Login Integration Guide

This guide explains how to integrate WeChat OAuth2.0 login into Android and iOS mobile applications, covering preparation, authorization flow, API calls for access tokens and user info, phone‑number binding, re‑login handling, and test case recommendations.

APIAndroidOAuth2.0
0 likes · 12 min read
WeChat OAuth2.0 Mobile Application Login Integration Guide
FunTester
FunTester
Mar 14, 2020 · Mobile Development

WeChat OAuth2.0 Mobile Login Integration Guide

This guide explains how to integrate WeChat OAuth2.0 login into Android and iOS mobile applications, covering preparation, the authorization code flow, token exchange, user‑info retrieval, phone‑number binding, repeated login handling, and comprehensive test cases.

APIAndroidOAuth2.0
0 likes · 11 min read
WeChat OAuth2.0 Mobile Login Integration Guide
Sohu Tech Products
Sohu Tech Products
Nov 6, 2019 · Information Security

Evolution of Web Authentication: From Passwords to WebAuthn

This article reviews the historical development, current practices, and future direction of web authentication, covering traditional password login, third‑party protocols like OpenID and OAuth2.0, two‑factor authentication methods, and the emerging password‑less WebAuthn standard.

2FAOAuth2.0OpenID
0 likes · 12 min read
Evolution of Web Authentication: From Passwords to WebAuthn
Java Architecture Diary
Java Architecture Diary
Apr 9, 2019 · Information Security

How to Build an OAuth2.0 Authorization Server with Spring Cloud

This article explains how to create an open platform using OAuth2.0 authorization code flow, configure Spring Cloud dependencies, set up the authorization and security servers, test the endpoints, and customize the login and confirmation pages, providing complete code examples and diagrams.

Authorization ServerOAuth2.0Spring Cloud
0 likes · 7 min read
How to Build an OAuth2.0 Authorization Server with Spring Cloud