Tag

session

0 views collected around this technical thread.

Code Ape Tech Column
Code Ape Tech Column
May 27, 2025 · Information Security

Combining JWT and Session for Secure and Scalable User Authentication

This article explains how JWT provides stateless authentication while Session adds an extra security layer and lifecycle management, and demonstrates their combined use with Java code to achieve both scalability and fine‑grained control over user sessions.

AuthenticationJWTJava
0 likes · 8 min read
Combining JWT and Session for Secure and Scalable User Authentication
Top Architecture Tech Stack
Top Architecture Tech Stack
May 15, 2025 · Backend Development

Understanding Cookie + Session Mechanism and Distributed Session Sharing Solutions

This article explains the Cookie + Session mechanism for maintaining user state, discusses its limitations such as size, performance and security, examines challenges in distributed environments, and reviews common solutions including session replication, sticky load balancing, centralized storage, and the use of ThreadLocal for small‑scale backend applications.

BackendDistributed SystemsWeb Development
0 likes · 17 min read
Understanding Cookie + Session Mechanism and Distributed Session Sharing Solutions
php中文网 Courses
php中文网 Courses
May 9, 2025 · Backend Development

Controlling SVG Animations with PHP Session Data: Techniques and Best Practices

This article explains how to combine PHP session management with SVG animation techniques—using server‑generated SVG, AJAX polling, or WebSocket communication—to create real‑time, personalized visual effects while addressing performance and security considerations.

PHPWeb Developmentanimation
0 likes · 6 min read
Controlling SVG Animations with PHP Session Data: Techniques and Best Practices
php中文网 Courses
php中文网 Courses
Apr 10, 2025 · Backend Development

Implementing Debounce and Preventing Duplicate Submissions in PHP

This article explains how to implement debounce functionality and prevent duplicate form submissions in PHP using session storage, providing step‑by‑step code examples for creating a debounce helper, generating and validating tokens, and integrating them into web forms.

BackendDebouncePHP
0 likes · 5 min read
Implementing Debounce and Preventing Duplicate Submissions in PHP
Selected Java Interview Questions
Selected Java Interview Questions
Apr 8, 2025 · Backend Development

Authentication Implementation: Choosing Between JWT and Session in Backend Development

This article explains the technical selection between JWT and session for authentication, compares their differences, advantages, and disadvantages, and provides a complete Java implementation—including token generation, Redis storage, login/logout, password update, and request interception—demonstrating why JWT was chosen for a distributed backend system.

AuthenticationBackendJWT
0 likes · 13 min read
Authentication Implementation: Choosing Between JWT and Session in Backend Development
Lobster Programming
Lobster Programming
Apr 8, 2025 · Frontend Development

Understanding Cookies, Sessions, Local Storage & Session Storage: A Frontend Guide

This article explains the concepts, purposes, and trade‑offs of Cookies, Sessions, Local Storage, and Session Storage, detailing how each stores data, their security attributes, typical use cases, and the differences between client‑side and server‑side state management in web development.

HTML5cookiesfrontend
0 likes · 7 min read
Understanding Cookies, Sessions, Local Storage & Session Storage: A Frontend Guide
Architect
Architect
Apr 6, 2025 · Information Security

Technical Selection and Implementation of Authentication: JWT vs Session

This article compares JWT and session-based authentication, detailing their differences, certification processes, advantages, disadvantages, security considerations, performance impacts, token renewal, and revocation strategies, and provides a complete Java implementation using Spring, Redis, and custom utility classes.

AuthenticationJWTJava
0 likes · 12 min read
Technical Selection and Implementation of Authentication: JWT vs Session
Test Development Learning Exchange
Test Development Learning Exchange
Mar 21, 2025 · Information Security

Practical Session and Token Authentication with Python Requests

This article demonstrates practical implementations of session-based and token-based authentication, including JWT and a dual-token (access and refresh) mechanism, using Python's requests library, and explains how to obtain, use, and refresh tokens for protected API endpoints in automated testing.

APIAuthenticationSecurity
0 likes · 6 min read
Practical Session and Token Authentication with Python Requests
Test Development Learning Exchange
Test Development Learning Exchange
Mar 17, 2025 · Backend Development

Python Requests Library: Core Modules, Methods, Parameters, and Usage Examples

This tutorial explains the Python requests library, covering its core modules, HTTP methods (GET, POST, PUT, DELETE), key parameters, session management, and exception handling with practical code examples for API interaction and best practices.

APIException HandlingHTTP
0 likes · 5 min read
Python Requests Library: Core Modules, Methods, Parameters, and Usage Examples
Architect's Guide
Architect's Guide
Feb 21, 2025 · Information Security

Technical Selection and Implementation of Authentication: JWT vs Session in a Java Backend

This article compares JWT and session authentication, discusses their differences, advantages, security and performance considerations, and provides a complete Java implementation with Redis integration, including token generation, validation, renewal, and interceptor configuration for secure backend services.

AuthenticationBackendJWT
0 likes · 13 min read
Technical Selection and Implementation of Authentication: JWT vs Session in a Java Backend
Architect's Guide
Architect's Guide
Jan 25, 2025 · Information Security

Understanding Session and Token‑Based Authentication with JWT in Java

This article explains the stateless nature of HTTP, compares session‑based and token‑based authentication, describes JWT structure and security considerations, and provides Java code examples for implementing login, token generation, verification, and extraction in a backend application.

AuthenticationBackendJWT
0 likes · 8 min read
Understanding Session and Token‑Based Authentication with JWT in Java
Java Architect Essentials
Java Architect Essentials
Dec 9, 2024 · Information Security

Understanding Traditional Session Mechanisms and Implementing SSO with CAS in Java

This article explains the limitations of traditional HTTP session handling, explores session sharing strategies for clustered environments, and demonstrates how to build a single sign‑on solution using CAS and OAuth2 concepts with complete Java code examples for filters, controllers, and login pages.

AuthenticationBackendCAS
0 likes · 14 min read
Understanding Traditional Session Mechanisms and Implementing SSO with CAS in Java
Java Architect Essentials
Java Architect Essentials
Nov 29, 2024 · Information Security

Combining JWT and Session for Secure User Authentication and Authorization

This article explains the complementary roles of JWT and server‑side Session in user authentication and authorization, outlines why Session is needed for added security and lifecycle management, and provides Java code examples demonstrating their integrated usage.

AuthenticationAuthorizationBackend
0 likes · 7 min read
Combining JWT and Session for Secure User Authentication and Authorization
Top Architect
Top Architect
Oct 2, 2024 · Backend Development

Combining JWT and Session for Secure User Authentication

This article explains how JWT provides stateless user authentication while Session adds an extra security layer and state management, detailing their individual roles, reasons for using Session, combined benefits, and includes Java code examples for implementing login and token validation.

AuthenticationBackendJWT
0 likes · 9 min read
Combining JWT and Session for Secure User Authentication
Top Architect
Top Architect
Sep 18, 2024 · Backend Development

Combining JWT and Session for Secure User Authentication

This article explains the distinct roles of JWT and Session in user authentication, why a Session layer is needed alongside JWT, and demonstrates with Java code how to create and validate tokens while managing session state for enhanced security and scalability.

AuthenticationBackendJWT
0 likes · 9 min read
Combining JWT and Session for Secure User Authentication
Architecture Digest
Architecture Digest
Sep 8, 2024 · Information Security

Combining JWT and Session for Secure Authentication and State Management

This article explains how JWT provides stateless user authentication while Session adds an extra security layer and state management, detailing their respective roles, the reasons for using Session alongside JWT, and offering Java code examples that illustrate their combined implementation.

AuthenticationBackendJWT
0 likes · 7 min read
Combining JWT and Session for Secure Authentication and State Management
php中文网 Courses
php中文网 Courses
Aug 23, 2024 · Backend Development

Regenerating PHP Session IDs with session_regenerate_id for Improved Security

This article explains how to use PHP's session_regenerate_id function to securely regenerate session IDs, discusses the reasons for doing so, provides sample code, and outlines important precautions such as starting the session, using HTTPS, and avoiding excessive regeneration.

BackendPHPSecurity
0 likes · 4 min read
Regenerating PHP Session IDs with session_regenerate_id for Improved Security
Architect's Guide
Architect's Guide
Aug 12, 2024 · Information Security

Implementing Single Sign-On (SSO) with CAS and Session Management in Distributed Backend Systems

This article explains the challenges of multiple product logins, reviews traditional session mechanisms, discusses session sharing solutions in clustered environments, and presents a CAS‑based single sign‑on implementation with Java code examples, highlighting differences between CAS and OAuth2 for secure authentication.

AuthenticationBackendCAS
0 likes · 13 min read
Implementing Single Sign-On (SSO) with CAS and Session Management in Distributed Backend Systems
Top Architect
Top Architect
Jul 24, 2024 · Information Security

Understanding Session and Token-Based Authentication with JWT in Web Applications

The article explains how HTTP’s stateless nature requires session or token mechanisms for preserving user state, compares session‑based and JWT token authentication, details JWT structure, and provides Java code examples for generating, verifying, and extracting token information, while also promoting related services.

AuthenticationJWTJava
0 likes · 10 min read
Understanding Session and Token-Based Authentication with JWT in Web Applications
php中文网 Courses
php中文网 Courses
Jul 24, 2024 · Backend Development

Using PHP session_start: Basic Usage, Lifetime Control, and Session Destruction

This article explains how to correctly use PHP's session_start function, demonstrates setting session lifetimes with session_set_cookie_params, and shows how to destroy sessions using session_destroy, providing clear code examples for each step.

BackendPHPWeb Development
0 likes · 4 min read
Using PHP session_start: Basic Usage, Lifetime Control, and Session Destruction