Tagged articles
14 articles
Page 1 of 1
Java Tech Enthusiast
Java Tech Enthusiast
May 14, 2026 · Information Security

Why JWT Still Needs Redis Despite Its Stateless Promise

Although JWT is marketed as a stateless, database‑free authentication method, real‑world applications often store token identifiers in Redis to handle logout, password changes, and token renewal, which reintroduces state and a database lookup.

AuthenticationJWTRefresh token
0 likes · 6 min read
Why JWT Still Needs Redis Despite Its Stateless Promise
Senior Tony
Senior Tony
Jan 7, 2026 · Information Security

How to Implement Seamless Token Auto‑Renewal: Frontend Refresh, Sliding Window, and Double‑Token Strategies

Token expiration can be handled with three main strategies—frontend‑driven periodic refresh, backend sliding‑window renewal, and the industry‑standard double‑token (access + refresh) scheme—each balancing implementation simplicity, user experience, and security, with the double‑token approach offering the most robust solution.

AuthenticationBackend DevelopmentRefresh token
0 likes · 7 min read
How to Implement Seamless Token Auto‑Renewal: Frontend Refresh, Sliding Window, and Double‑Token Strategies
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Sep 26, 2025 · Backend Development

Double Token Auth with Express & Vue: Complete Implementation Guide

This article explains the double token (Access and Refresh) authentication mechanism, detailing its core principles, security benefits, and step‑by‑step implementation with Express on the backend and Vue on the frontend, including token issuance, verification, rotation, middleware, and client‑side handling.

ExpressRefresh tokenaccess_token
0 likes · 17 min read
Double Token Auth with Express & Vue: Complete Implementation Guide
Code Mala Tang
Code Mala Tang
Jul 24, 2025 · Information Security

Boost FastAPI Security: OAuth2, JWT, RBAC, Refresh Tokens & MFA

This guide explains how to secure FastAPI applications using OAuth2 with JWT, role‑based access control, refresh‑token workflows, multi‑factor authentication, and integration with external providers such as Auth0, Keycloak, and Firebase.

AuthenticationFastAPIJWT
0 likes · 9 min read
Boost FastAPI Security: OAuth2, JWT, RBAC, Refresh Tokens & MFA
Top Architect
Top Architect
Jun 29, 2022 · Information Security

OAuth 2.0 Protocol Overview and Grant Types

This article provides a comprehensive introduction to the OAuth 2.0 protocol, covering its core concepts, authorization flow, four grant types (authorization code, implicit, resource owner password credentials, client credentials), request and response parameters, token handling, and practical examples with code snippets.

AuthenticationAuthorizationGrant Types
0 likes · 22 min read
OAuth 2.0 Protocol Overview and Grant Types
Top Architect
Top Architect
Jun 18, 2022 · Information Security

OAuth 2.0 Protocol Overview and Authorization Flows

This article provides a comprehensive introduction to the OAuth 2.0 protocol, explaining its core concepts, the roles of resource owner, client, authorization server and resource server, and detailing the four grant types—authorization code, implicit, resource‑owner password credentials, and client credentials—along with token request/response formats and refresh token usage.

AuthorizationGrant TypesOAuth2.0
0 likes · 23 min read
OAuth 2.0 Protocol Overview and Authorization Flows
System Architect Go
System Architect Go
Jan 28, 2021 · Information Security

OAuth 2.0 Authorization Code and Implicit Grant Flows

This article explains the OAuth 2.0 protocol, describes its four grant types, focuses on the Authorization Code and Implicit flows, outlines the involved roles, token types, client registration steps, and provides detailed request‑response examples for both grant types.

Authorization CodeImplicit GrantOAuth 2.0
0 likes · 8 min read
OAuth 2.0 Authorization Code and Implicit Grant Flows
Open Source Tech Hub
Open Source Tech Hub
Dec 11, 2019 · Information Security

Why Choose JWT? Mastering Access and Refresh Tokens for Secure APIs

This article explains why JWT has become the preferred method for session management in modern RESTful and SPA architectures, detailing the roles, lifecycles, and implementation steps of access_token and refresh_token, and providing concrete API examples for login and token renewal.

API authenticationJWTRefresh token
0 likes · 6 min read
Why Choose JWT? Mastering Access and Refresh Tokens for Secure APIs
UC Tech Team
UC Tech Team
Nov 16, 2018 · Information Security

Understanding OAuth Authorization Flow and Grant Types

This article explains the OAuth protocol, its role in providing secure third‑party access to user resources, describes the overall authorization architecture, outlines the involved parties and step‑by‑step flow, and details the four main grant types along with token refresh mechanisms.

APIAuthorizationGrant Types
0 likes · 6 min read
Understanding OAuth Authorization Flow and Grant Types