Tagged articles
8 articles
Page 1 of 1
Java Captain
Java Captain
Jun 12, 2025 · Backend Development

How to Securely Encrypt Nacos Config Passwords in Spring Cloud Applications

Learn how to replace plain‑text passwords in Spring Cloud’s Nacos configuration with encrypted values by extending NacosConfigProperties, overriding its initialization, and registering a custom bootstrap auto‑configuration, ensuring your application complies with corporate security policies.

Backend DevelopmentJavaNacos
0 likes · 5 min read
How to Securely Encrypt Nacos Config Passwords in Spring Cloud Applications
IT Xianyu
IT Xianyu
Jul 9, 2024 · Information Security

Encrypting Plaintext Passwords in SpringBoot Configuration Using Jasypt

This article explains how to protect sensitive database credentials in SpringBoot applications by encrypting passwords in configuration files, leveraging Jasypt and a custom BeanFactoryPostProcessor to transparently decrypt values at runtime.

Configuration SecurityJasyptJava
0 likes · 8 min read
Encrypting Plaintext Passwords in SpringBoot Configuration Using Jasypt
Top Architect
Top Architect
Jun 12, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model classifications, permission concepts, and user‑group usage, then demonstrates how to implement RBAC in a Spring Security application, including in‑memory authentication, JWT integration, JSON login, and password encryption techniques.

AuthenticationJWTJava
0 likes · 17 min read
Understanding RBAC and Implementing Spring Security with JWT
Architect
Architect
Mar 20, 2024 · Information Security

RBAC Permission Analysis and Spring Security JWT Integration Tutorial

This tutorial explains RBAC concepts and model classifications, demonstrates permission and user‑group management, and provides step‑by‑step guidance for implementing Spring Security with in‑memory authentication, JWT integration, JSON login, password encryption, and database authentication using Java code examples.

JWTJavaPassword Encryption
0 likes · 18 min read
RBAC Permission Analysis and Spring Security JWT Integration Tutorial
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2023 · Backend Development

Spring Security Overview: Core Features, Principles, Access Control Methods, Role vs Authority, Password Encryption, and Username/Password Authentication Flow

This article explains Spring Security's core functions, underlying filter‑based mechanism, various request‑access control methods, the distinction between hasRole and hasAuthority, how to encrypt passwords with BCryptPasswordEncoder, and the complete username‑password authentication process for securing backend applications.

AuthenticationAuthorizationBackend Security
0 likes · 10 min read
Spring Security Overview: Core Features, Principles, Access Control Methods, Role vs Authority, Password Encryption, and Username/Password Authentication Flow
Java Architect Essentials
Java Architect Essentials
Oct 20, 2022 · Information Security

RBAC Permission Analysis and Spring Security Implementation with JWT and JSON Login

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model variants, permission concepts, and user‑group usage, then demonstrates practical Spring Security setups including basic configuration, JWT integration, JSON‑based login, password encryption, and database authentication with complete code examples.

JSON LoginJWTPassword Encryption
0 likes · 17 min read
RBAC Permission Analysis and Spring Security Implementation with JWT and JSON Login
Java Backend Technology
Java Backend Technology
Jun 25, 2017 · Backend Development

Mastering Druid: Configure Connection Pool, Encrypt Passwords, and Monitor SQL

This guide explains Druid’s key features—including a high‑performance connection pool, SQL monitoring, password encryption, and customizable JDBC filters—and provides step‑by‑step instructions for configuring the pool, creating a custom DruidPasswordCallback, generating RSA keys, encrypting passwords, and integrating the setup into Spring.

Backend DevelopmentConnection PoolDruid
0 likes · 5 min read
Mastering Druid: Configure Connection Pool, Encrypt Passwords, and Monitor SQL