Tagged articles
148 articles
Page 1 of 2
Architect
Architect
Apr 28, 2026 · Artificial Intelligence

Agent Harness Context: Chat Log vs. Workset – How Runtime Management Shapes Long‑Running Agents

The article argues that an agent harness’s context window should be treated as a bounded workset rather than an ever‑growing transcript, and explains how pagination, compression, tool‑output limits, session isolation, and sub‑agent design together determine whether long‑running agents remain reliable and efficient.

Agent HarnessContext managementLLM
0 likes · 24 min read
Agent Harness Context: Chat Log vs. Workset – How Runtime Management Shapes Long‑Running Agents
java1234
java1234
Apr 18, 2026 · Backend Development

Beyond Simple Caching: 8 Essential Redis Use Cases for Java Backend Engineers

This guide walks Java backend developers through Redis’s eight core scenarios—caching, distributed locks, rate limiting, session sharing, leaderboards, counters, message and delay queues, bitmap statistics, and geolocation—providing complete code, diagrams, and production‑grade best practices.

BitmapCacheGEO
0 likes · 21 min read
Beyond Simple Caching: 8 Essential Redis Use Cases for Java Backend Engineers
Frontend AI Walk
Frontend AI Walk
Mar 17, 2026 · Artificial Intelligence

Master the 5 Core Concepts of AI Agent Orchestration

This guide explains the five fundamental concepts—Agent, Harness, Protocol, Session, and Orchestration—through definitions, comparisons, concrete code examples, diagrams, and practical challenges, showing how they interrelate to enable safe and controllable multi‑agent AI workflows.

ACPAI AgentHarness
0 likes · 11 min read
Master the 5 Core Concepts of AI Agent Orchestration
Java Architect Handbook
Java Architect Handbook
Mar 16, 2026 · Backend Development

Cookie vs Session vs Token: Master Java Authentication for Interviews

This guide outlines interview focus points, core definitions, and deep analysis of Cookie, Session, and Token (JWT), compares their storage, security, scalability, and cross‑origin support, and provides high‑frequency follow‑up questions, common variants, memory mnemonics, and selection principles for Java authentication.

AuthenticationCookieJWT
0 likes · 15 min read
Cookie vs Session vs Token: Master Java Authentication for Interviews
php Courses
php Courses
Dec 5, 2025 · Backend Development

How to Implement Debounce and Prevent Duplicate Submissions in PHP

This guide explains how to use PHP sessions to create a debounce function that limits rapid event firing and a token‑based mechanism that stops users from submitting the same form multiple times, complete with step‑by‑step code examples.

DebouncePHPSession
0 likes · 4 min read
How to Implement Debounce and Prevent Duplicate Submissions in PHP
Ray's Galactic Tech
Ray's Galactic Tech
Nov 19, 2025 · Information Security

Mastering Modern Login Mechanisms: Cookies, Sessions, JWT, OAuth2 & SSO

This comprehensive guide explains why authentication is needed for stateless HTTP, walks through the workflows, advantages, and drawbacks of Cookies, Sessions, Tokens, JWTs, Refresh Tokens, blacklist strategies, and OAuth2/OAuth2.1, and provides practical security best‑practice recommendations for web, mobile, and micro‑service architectures.

AuthenticationJWTOAuth2
0 likes · 12 min read
Mastering Modern Login Mechanisms: Cookies, Sessions, JWT, OAuth2 & SSO
Top Architect
Top Architect
Nov 11, 2025 · Information Security

Mastering Authentication & Authorization: Cookies, Sessions, Tokens, and JWT Explained

This comprehensive guide explores the fundamentals of authentication and authorization, detailing how credentials, cookies, and sessions work together, and compares traditional session-based approaches with modern token-based solutions such as JWT, covering their mechanisms, advantages, drawbacks, and best practices for secure, scalable web applications.

AuthenticationAuthorizationJWT
0 likes · 38 min read
Mastering Authentication & Authorization: Cookies, Sessions, Tokens, and JWT Explained
Architect's Guide
Architect's Guide
Nov 9, 2025 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, introduces JWT structure and usage, discusses common security concerns, and outlines practical solutions for distributed systems and modern web applications.

AuthenticationAuthorizationCookie
0 likes · 36 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT
Alibaba Cloud Native
Alibaba Cloud Native
Sep 19, 2025 · Cloud Native

Why Serverless Is the Future of AI Apps: From Stateless to Session‑Aware Cloud‑Native Architecture

The article examines how AI application infrastructure is shifting from traditional always‑on, stateless deployments to serverless models that balance cost, scalability, and stateful conversational needs, outlining architectural challenges, evolution stages, and emerging solutions such as external state storage, session‑affinity scheduling, durable functions, and session‑oriented runtimes.

AIRuntimeServerless
0 likes · 26 min read
Why Serverless Is the Future of AI Apps: From Stateless to Session‑Aware Cloud‑Native Architecture
Su San Talks Tech
Su San Talks Tech
Aug 23, 2025 · Information Security

Cookie, Session, Token, JWT, OAuth2: Which One Fits Your Project?

This article demystifies the differences between Cookie, Session, Token, JWT, and OAuth2, explains their underlying mechanisms, shows practical Spring code examples, compares their security properties and suitable scenarios, and provides clear guidance on choosing the right authentication strategy for modern web applications.

CookieJWTOAuth2
0 likes · 13 min read
Cookie, Session, Token, JWT, OAuth2: Which One Fits Your Project?
Top Architecture Tech Stack
Top Architecture Tech Stack
May 15, 2025 · Backend Development

Understanding Cookie + Session Mechanism and Distributed Session Sharing Solutions

This article explains the Cookie + Session mechanism for maintaining user state, discusses its limitations such as size, performance and security, examines challenges in distributed environments, and reviews common solutions including session replication, sticky load balancing, centralized storage, and the use of ThreadLocal for small‑scale backend applications.

CookieDistributed SystemsSession
0 likes · 17 min read
Understanding Cookie + Session Mechanism and Distributed Session Sharing Solutions
php Courses
php Courses
Apr 10, 2025 · Backend Development

Implementing Debounce and Preventing Duplicate Submissions in PHP

This article explains how to implement debounce functionality and prevent duplicate form submissions in PHP using session storage, providing step‑by‑step code examples for creating a debounce helper, generating and validating tokens, and integrating them into web forms.

DebounceFormSession
0 likes · 5 min read
Implementing Debounce and Preventing Duplicate Submissions in PHP
Selected Java Interview Questions
Selected Java Interview Questions
Apr 8, 2025 · Backend Development

Authentication Implementation: Choosing Between JWT and Session in Backend Development

This article explains the technical selection between JWT and session for authentication, compares their differences, advantages, and disadvantages, and provides a complete Java implementation—including token generation, Redis storage, login/logout, password update, and request interception—demonstrating why JWT was chosen for a distributed backend system.

AuthenticationBackendJWT
0 likes · 13 min read
Authentication Implementation: Choosing Between JWT and Session in Backend Development
Architect
Architect
Apr 6, 2025 · Information Security

Technical Selection and Implementation of Authentication: JWT vs Session

This article compares JWT and session-based authentication, detailing their differences, certification processes, advantages, disadvantages, security considerations, performance impacts, token renewal, and revocation strategies, and provides a complete Java implementation using Spring, Redis, and custom utility classes.

AuthenticationJWTJava
0 likes · 12 min read
Technical Selection and Implementation of Authentication: JWT vs Session
Top Architect
Top Architect
Oct 2, 2024 · Backend Development

Combining JWT and Session for Secure User Authentication

This article explains how JWT provides stateless user authentication while Session adds an extra security layer and state management, detailing their individual roles, reasons for using Session, combined benefits, and includes Java code examples for implementing login and token validation.

JWTSession
0 likes · 9 min read
Combining JWT and Session for Secure User Authentication
Top Architect
Top Architect
Sep 18, 2024 · Backend Development

Combining JWT and Session for Secure User Authentication

This article explains the distinct roles of JWT and Session in user authentication, why a Session layer is needed alongside JWT, and demonstrates with Java code how to create and validate tokens while managing session state for enhanced security and scalability.

JWTJavaSession
0 likes · 9 min read
Combining JWT and Session for Secure User Authentication
Architecture Digest
Architecture Digest
Sep 8, 2024 · Information Security

Combining JWT and Session for Secure Authentication and State Management

This article explains how JWT provides stateless user authentication while Session adds an extra security layer and state management, detailing their respective roles, the reasons for using Session alongside JWT, and offering Java code examples that illustrate their combined implementation.

AuthenticationBackendJWT
0 likes · 7 min read
Combining JWT and Session for Secure Authentication and State Management
php Courses
php Courses
Aug 23, 2024 · Backend Development

Regenerating PHP Session IDs with session_regenerate_id for Improved Security

This article explains how to use PHP's session_regenerate_id function to securely regenerate session IDs, discusses the reasons for doing so, provides sample code, and outlines important precautions such as starting the session, using HTTPS, and avoiding excessive regeneration.

BackendPHPSecurity
0 likes · 4 min read
Regenerating PHP Session IDs with session_regenerate_id for Improved Security
Top Architect
Top Architect
Jul 24, 2024 · Information Security

Understanding Session and Token-Based Authentication with JWT in Web Applications

The article explains how HTTP’s stateless nature requires session or token mechanisms for preserving user state, compares session‑based and JWT token authentication, details JWT structure, and provides Java code examples for generating, verifying, and extracting token information, while also promoting related services.

AuthenticationJWTJava
0 likes · 10 min read
Understanding Session and Token-Based Authentication with JWT in Web Applications
Java Architect Essentials
Java Architect Essentials
Jul 17, 2024 · Information Security

Why Many Experts Advise Against Using JWT for Authentication

This article explains what JSON Web Tokens are, outlines their typical workflow, and critically examines their drawbacks—including size overhead, redundant signatures, revocation challenges, lack of encryption, and broader security concerns—before concluding with practical recommendations for their use.

AuthenticationJWTSecurity
0 likes · 8 min read
Why Many Experts Advise Against Using JWT for Authentication
Open Source Tech Hub
Open Source Tech Hub
May 7, 2024 · Information Security

JWT vs Session: Which Authentication Method Fits Your Web App?

This article explains what JWT and Session are, compares their storage, state management, security, performance, cross‑domain support, expiration, use cases, logout mechanisms, and one‑time use scenarios, and helps you decide which authentication approach best suits your application’s needs.

AuthenticationJWTSession
0 likes · 6 min read
JWT vs Session: Which Authentication Method Fits Your Web App?
21CTO
21CTO
Apr 23, 2024 · Information Security

Session vs Token Authentication: Which Is Right for Your Backend?

This article explains how session‑based and token‑based (JWT) authentication work in backend applications, compares their workflows, shows practical Express.js code examples, and helps you decide which method best fits your project's security and scalability needs.

AuthenticationBackendExpress
0 likes · 10 min read
Session vs Token Authentication: Which Is Right for Your Backend?
Architect
Architect
Feb 19, 2024 · Information Security

Mastering Single Sign-On: From Session Basics to CAS Implementation

This article walks through the fundamentals of HTTP session handling, the challenges of session sharing in clustered environments, and presents a step‑by‑step design of a Single Sign‑On solution using CAS, including concrete code examples, Redis‑based session storage, and a comparison with OAuth2.

AuthenticationCASJava
0 likes · 17 min read
Mastering Single Sign-On: From Session Basics to CAS Implementation
php Courses
php Courses
Feb 18, 2024 · Backend Development

Secure User Login and Logout Implementation in PHP

This article explains how to securely implement user login and logout functionality in PHP by using session management, server‑side validation, and CSRF token protection, providing sample code for authentication, session handling, and safe logout procedures.

CSRFPHPSession
0 likes · 6 min read
Secure User Login and Logout Implementation in PHP
php Courses
php Courses
Dec 23, 2023 · Backend Development

Implementing User Impersonation in Laravel with the Lab404 Impersonate Package

This guide explains how to add user impersonation to a Laravel application using the Lab404 Impersonate package, covering installation, service provider registration, session handling, helper functions, routing, and API methods for starting and ending impersonation sessions.

AuthenticationImpersonationLaravel
0 likes · 6 min read
Implementing User Impersonation in Laravel with the Lab404 Impersonate Package
php Courses
php Courses
Dec 1, 2023 · Backend Development

Implement Debounce and Duplicate Submission Prevention in PHP

This article explains how to implement debounce to limit frequent event triggers and prevent duplicate form submissions in PHP by using session storage and token validation, providing step‑by‑step instructions and complete code examples.

DebouncePHPSession
0 likes · 4 min read
Implement Debounce and Duplicate Submission Prevention in PHP
php Courses
php Courses
Aug 8, 2023 · Backend Development

How to Build a Secure Online Voting System with PHP

This article explains how to design and implement a PHP-based online voting system with user registration, login, vote submission, and anti‑cheating measures such as session validation, duplicate‑vote checks, transactions, captchas, and vote‑limit enforcement.

Backend DevelopmentCaptchaPHP
0 likes · 9 min read
How to Build a Secure Online Voting System with PHP
MaGe Linux Operations
MaGe Linux Operations
Apr 25, 2023 · Backend Development

Choosing JWT vs Session: A Practical Guide to Secure Backend Authentication

This article compares JWT and session authentication, explains their differences, security and performance trade‑offs, and provides a complete Java implementation with Redis integration, guiding developers on selecting and implementing the most suitable authentication method for distributed backend systems.

AuthenticationJWTSecurity
0 likes · 14 min read
Choosing JWT vs Session: A Practical Guide to Secure Backend Authentication
Architecture Digest
Architecture Digest
Apr 19, 2023 · Backend Development

Technical Selection and Implementation of Authentication Using JWT and Session in a Java Backend

This article compares session‑based and JWT‑based authentication, discusses their advantages, disadvantages, security and performance considerations, and provides a complete Java Spring Boot implementation—including dependency configuration, utility classes, login/logout/password update logic, and interceptor handling—using Redis for token management.

BackendJWTJava
0 likes · 13 min read
Technical Selection and Implementation of Authentication Using JWT and Session in a Java Backend
Top Architect
Top Architect
Feb 22, 2023 · Backend Development

Resolving HTTPS Redirect and Session Consistency Issues with Nginx, Docker, and Memcached

This article explains why an Nginx reverse‑proxy configuration that proxies HTTPS requests to a backend server causes the browser URL to change, how to fix the redirect by using HTTPS in the proxy, and how to achieve session consistency across multiple Tomcat instances by deploying Memcached with Docker and adjusting Tomcat’s session manager.

DockerHTTPSMemcached
0 likes · 8 min read
Resolving HTTPS Redirect and Session Consistency Issues with Nginx, Docker, and Memcached
IT Architects Alliance
IT Architects Alliance
Nov 17, 2022 · Information Security

Comprehensive Guide to Frontend Authentication Methods and Their Differences

This article explains the concepts, relationships, and practical implementations of authentication, authorization, and access control, and compares ten common frontend authentication methods—including HTTP Basic, Session‑Cookie, Token, JWT, SSO, OAuth, and QR‑code login—detailing their workflows, advantages, disadvantages, and suitable scenarios.

JWTOAuthSSO
0 likes · 37 min read
Comprehensive Guide to Frontend Authentication Methods and Their Differences
Programmer DD
Programmer DD
Nov 14, 2022 · Backend Development

Choosing Between JWT and Session: Pros, Cons, and Implementation Guide

This article compares JWT and session authentication, outlines their differences, advantages, security considerations, performance impacts, and provides a complete Java implementation with Redis integration, helping developers decide the best approach for their projects.

AuthenticationJWTJava
0 likes · 16 min read
Choosing Between JWT and Session: Pros, Cons, and Implementation Guide
php Courses
php Courses
Nov 1, 2022 · Backend Development

Resolving Duplicate Set-Cookie Header Caused by Repeated session_start() Calls in PHP

The article explains why calling PHP's session_start() multiple times generates duplicate Set-Cookie headers, provides a code-based fix using session_abort() and header_remove(), and discusses session file locking, cookie lifetime, and garbage collection settings to manage session behavior effectively.

BackendSessionSession Management
0 likes · 3 min read
Resolving Duplicate Set-Cookie Header Caused by Repeated session_start() Calls in PHP
Architect
Architect
Oct 26, 2022 · Information Security

Choosing Between JWT and Session for Authentication: Technical Selection and Implementation

This article compares JWT and session authentication, discusses their differences, security, performance, and lifecycle considerations, and provides a complete Java implementation—including dependency configuration, token utilities, Redis integration, login/logout flows, password updates, and request interception—guiding developers to select the most suitable approach for their projects.

AuthenticationJWTJava
0 likes · 14 min read
Choosing Between JWT and Session for Authentication: Technical Selection and Implementation
Architect's Guide
Architect's Guide
Oct 15, 2022 · Information Security

Understanding Session Mechanisms, Cluster Session Challenges, and SSO Solutions with a CAS Implementation

This article explains traditional HTTP session handling, the problems of session sharing in clustered and multi‑service environments, and presents practical SSO solutions—including session replication, centralized Redis storage, and a complete CAS‑based single sign‑on implementation with Java code examples.

CASJavaSession
0 likes · 14 min read
Understanding Session Mechanisms, Cluster Session Challenges, and SSO Solutions with a CAS Implementation
Top Architect
Top Architect
Aug 26, 2022 · Information Security

Understanding Session Management, SSO, and CAS Implementation in Java

This article explains the challenges of traditional session mechanisms in distributed systems, explores session sharing solutions such as replication and centralized storage, details the design and flow of Single Sign‑On (SSO) using CAS, compares CAS with OAuth2, and provides complete Java code examples for a demo implementation.

CASJavaSSO
0 likes · 14 min read
Understanding Session Management, SSO, and CAS Implementation in Java
Laravel Tech Community
Laravel Tech Community
Aug 25, 2022 · Backend Development

Encapsulating Cookie and Session Operations in PHP

This tutorial shows how to create reusable PHP functions for reading, writing, and managing cookies and session data, including helper utilities to streamline backend web development by abstracting common operations and handling expiration, paths, and nested session keys.

CookieSessionweb-development
0 likes · 4 min read
Encapsulating Cookie and Session Operations in PHP
IT Architects Alliance
IT Architects Alliance
Aug 4, 2022 · Information Security

Understanding Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation

This article explains traditional session and authentication mechanisms, the problems of session sharing in clustered and multi‑service environments, and presents practical SSO solutions—including CAS‑based single sign‑on and its differences from OAuth2—accompanied by complete Java Spring code examples.

AuthenticationCASJava
0 likes · 16 min read
Understanding Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation
Programmer DD
Programmer DD
Aug 4, 2022 · Backend Development

Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2

This article explains the limitations of traditional HTTP session mechanisms, explores session sharing strategies in clustered environments, and provides a detailed walkthrough of implementing Single Sign-On using CAS, including code samples and a comparison with OAuth2 authentication.

AuthenticationCASJava
0 likes · 18 min read
Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2
Java Backend Technology
Java Backend Technology
Jul 31, 2022 · Backend Development

Mastering Single Sign-On (SSO) with CAS: From Session Basics to Full Demo

This article explains why unified authentication is essential for product suites, reviews traditional session mechanisms and their limitations in clustered environments, explores session‑sharing strategies, introduces CAS‑based SSO workflows, compares CAS with OAuth2, and provides a complete Spring Boot demo with code snippets and configuration details.

AuthenticationCASSSO
0 likes · 17 min read
Mastering Single Sign-On (SSO) with CAS: From Session Basics to Full Demo
Selected Java Interview Questions
Selected Java Interview Questions
Jul 25, 2022 · Backend Development

Four Approaches to Solving Session Management in Distributed Environments

This article examines four strategies for handling session data in distributed backend systems—session replication, client-side storage, hash-based load balancing, and centralized storage with Redis—detailing their principles, advantages, disadvantages, and practical recommendations for different deployment scales.

BackendDistributed SystemsSession
0 likes · 9 min read
Four Approaches to Solving Session Management in Distributed Environments
Su San Talks Tech
Su San Talks Tech
Mar 8, 2022 · Information Security

Cookie vs Session vs JWT: Choosing the Right Authentication Strategy

This article compares cookies, server-side sessions, and JWT tokens, explaining their mechanisms, advantages, drawbacks, and best-use scenarios for web authentication, load‑balanced environments, and mobile applications, while also addressing security concerns such as CSRF and token storage.

CookieSessionToken
0 likes · 15 min read
Cookie vs Session vs JWT: Choosing the Right Authentication Strategy
Top Architect
Top Architect
Mar 8, 2022 · Backend Development

Ensuring Session Consistency in Distributed Systems with Spring Session and Redis

This article explains the challenges of session consistency in distributed web architectures, reviews several solutions such as session replication, client‑side storage, hash‑based load balancing, centralized backend storage, and demonstrates a practical implementation using Spring Session with Redis for reliable, scalable session sharing.

Distributed SystemsSessionSpring Session
0 likes · 10 min read
Ensuring Session Consistency in Distributed Systems with Spring Session and Redis
Top Architect
Top Architect
Jan 16, 2022 · Information Security

Understanding Authentication, Authorization, Sessions, Cookies, Tokens and JWT

This article explains the concepts of authentication and authorization, the role of credentials, the differences between cookies and sessions, various session‑sharing strategies, token‑based authentication including JWT, common security algorithms and practical considerations for implementing secure access control in web applications.

CookieSession
0 likes · 35 min read
Understanding Authentication, Authorization, Sessions, Cookies, Tokens and JWT
ELab Team
ELab Team
Dec 24, 2021 · Information Security

Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation

This article explores the challenges of cross‑domain login state sharing, compares JWT, session‑cookie, and SSO solutions such as CAS and OAuth, details their structures, security considerations, and provides a step‑by‑step guide to building a simple SSO demo with code snippets and diagrams.

CASJWTOAuth
0 likes · 25 min read
Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation
Laravel Tech Community
Laravel Tech Community
Nov 15, 2021 · Backend Development

session_save_path — Get or Set the Current Session Save Path (PHP)

The article explains PHP's session_save_path function, detailing its syntax, how it returns or sets the session storage directory, the required path parameter, and the necessity to call it before session_start(), providing essential guidance for backend developers managing session data.

BackendConfigurationPHP
0 likes · 1 min read
session_save_path — Get or Set the Current Session Save Path (PHP)
Laravel Tech Community
Laravel Tech Community
Nov 11, 2021 · Backend Development

session_name — Getting and Setting PHP Session Name

The article explains PHP's session_name() function, describing how it returns the current session name, optionally sets a new name when a parameter is provided, details the allowed name format, return behavior, and includes a practical code example.

BackendSessionweb-development
0 likes · 2 min read
session_name — Getting and Setting PHP Session Name
Laravel Tech Community
Laravel Tech Community
Nov 9, 2021 · Backend Development

session_id — Get/Set the Current Session ID (PHP)

The article explains PHP's session_id() function, showing how to retrieve or set the current session ID, the optional id parameter requirements, character restrictions for different session handlers, and the function’s return behavior, including using the SID constant for URL integration.

BackendPHPSession
0 likes · 2 min read
session_id — Get/Set the Current Session ID (PHP)
Laravel Tech Community
Laravel Tech Community
Nov 8, 2021 · Backend Development

PHP session_destroy – Destroy All Data in a Session

The article explains PHP's session_destroy function, which deletes all data stored in the current session without resetting global variables or the session cookie, describes its return values, and provides a complete example showing how to start a session, clear variables, optionally remove the session cookie, and finally destroy the session.

BackendPHPSession
0 likes · 2 min read
PHP session_destroy – Destroy All Data in a Session
Laravel Tech Community
Laravel Tech Community
Nov 7, 2021 · Backend Development

session_cache_limiter — Retrieve and Set Cache Limiter

The session_cache_limiter function returns the current cache limiter name, defines HTTP cache‑control policies such as nocache, public, and private, accepts an optional limiter argument, and can be used in PHP scripts to control client and proxy caching behavior.

BackendCacheSession
0 likes · 2 min read
session_cache_limiter — Retrieve and Set Cache Limiter
Laravel Tech Community
Laravel Tech Community
Nov 7, 2021 · Backend Development

session_cache_expire — Returns the Current Cache Expiration Time in PHP

This article explains the PHP function session_cache_expire(), describing its purpose of returning the current session cache expiration value in minutes, its optional parameter for setting a new expiration time, the default return value, and provides a complete example demonstrating how to configure and display the cache limiter and expiration settings.

BackendCacheSession
0 likes · 2 min read
session_cache_expire — Returns the Current Cache Expiration Time in PHP
Laravel Tech Community
Laravel Tech Community
Nov 4, 2021 · Backend Development

session_status — Returns the Current Session Status

The article explains PHP's session_status() function, which takes no arguments and returns an integer indicating whether sessions are disabled, enabled without an active session, or enabled with an active session, providing developers with a simple way to check session state.

BackendSessionphp-function
0 likes · 1 min read
session_status — Returns the Current Session Status
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Oct 29, 2021 · Information Security

Understanding Single Sign-On (SSO): Why It Is Needed and How It Works

This article explains the necessity of Single Sign-On (SSO) in multi‑system environments, traces its origins from monolithic web applications to distributed clusters, and describes common implementation approaches for same‑domain and cross‑domain scenarios, including the use of a central authentication center such as CAS.

AuthenticationSSOSecurity
0 likes · 6 min read
Understanding Single Sign-On (SSO): Why It Is Needed and How It Works
Java Architect Essentials
Java Architect Essentials
Oct 8, 2021 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, details token types such as access and refresh tokens, introduces JWT principles and usage, and discusses security considerations and distributed session‑sharing strategies for modern web applications.

AuthenticationAuthorizationCookie
0 likes · 22 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT
Java Tech Enthusiast
Java Tech Enthusiast
Oct 8, 2021 · Backend Development

How to Share Session Across Distributed SpringBoot Services with Redis and Spring Session

This article walks through the challenges of sharing HTTP session data between micro‑services in a distributed SpringBoot architecture, demonstrates a Redis‑based manual solution, introduces Spring Session for transparent session clustering, and resolves OpenFeign cookie loss with a request interceptor.

Distributed SystemsOpenFeignSession
0 likes · 12 min read
How to Share Session Across Distributed SpringBoot Services with Redis and Spring Session
Top Architect
Top Architect
Sep 20, 2021 · Backend Development

Session Sharing Solutions in Distributed Systems: Nginx ip_hash, Tomcat Replication, Redis Cache, and Cookie

This article explains why session sharing is required in micro‑service and distributed environments and presents four practical solutions—Nginx ip_hash load balancing, Tomcat session replication, Redis centralized session cache, and cookie‑based sharing—detailing their implementations, code snippets, and pros and cons.

Distributed SystemsSessionTomcat
0 likes · 6 min read
Session Sharing Solutions in Distributed Systems: Nginx ip_hash, Tomcat Replication, Redis Cache, and Cookie
WeDoctor Frontend Technology
WeDoctor Frontend Technology
Sep 1, 2021 · Backend Development

From Cookies to JWT: Mastering Web Session and SSO Strategies

This article explains the evolution from basic web cookies to session management, explores domain sharing, details cookie‑session architecture, introduces single sign‑on methods, and compares the traditional session approach with JWT token authentication, highlighting their advantages, limitations, and implementation considerations.

BackendJWTSSO
0 likes · 16 min read
From Cookies to JWT: Mastering Web Session and SSO Strategies
IT Architects Alliance
IT Architects Alliance
Aug 25, 2021 · Information Security

Understanding Single Sign-On (SSO) Mechanism and Java Implementation

This article explains the stateless nature of HTTP, the session and cookie mechanisms for single‑system login, the challenges of multi‑system environments, and provides a detailed overview of Single Sign‑On (SSO) concepts, token flow, and step‑by‑step Java code examples for client and server implementations.

AuthenticationJavaSSO
0 likes · 14 min read
Understanding Single Sign-On (SSO) Mechanism and Java Implementation
macrozheng
macrozheng
Aug 16, 2021 · Information Security

Understanding Authentication, Authorization, and Tokens: A Practical Guide

This article explains the core concepts of authentication and authorization in Java web applications, distinguishes between credentials, cookies, sessions, access tokens, refresh tokens, and JWTs, and compares their security, storage, and usage scenarios to help developers choose the right mechanism for their projects.

SessionToken
0 likes · 11 min read
Understanding Authentication, Authorization, and Tokens: A Practical Guide
IT Architects Alliance
IT Architects Alliance
Jun 21, 2021 · Information Security

Token-Based Identity Authentication: Classification, Scenarios, and Security Considerations

This article analyses various client‑side authentication scenarios, classifies token types such as password, session, and API tokens, compares their cost, risk, and controllable attributes, and proposes a layered token architecture to improve security, privacy, and usability across multiple platforms.

AuthenticationSecuritySession
0 likes · 13 min read
Token-Based Identity Authentication: Classification, Scenarios, and Security Considerations
macrozheng
macrozheng
May 31, 2021 · Information Security

Cookie vs Session vs JWT: When to Use Each for Secure Authentication

This article compares the mechanisms of Cookie, Session, and JWT token for user authentication, explaining their histories, workflows, scalability challenges, security trade‑offs, and best‑practice scenarios such as single sign‑on, mobile access, and CSRF protection.

CookieSessionToken
0 likes · 16 min read
Cookie vs Session vs JWT: When to Use Each for Secure Authentication
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 18, 2021 · Backend Development

Troubleshooting Spring Boot OAuth2 Integration: Session Issues and Fixes

This guide walks through configuring Spring Boot 2.3.10 with OAuth2 client support, detailing required dependencies, application and security settings, common session‑related errors, step‑by‑step debugging of OAuth2LoginAuthenticationFilter and OAuth2AuthorizationRequestRedirectFilter, and the final solution of aligning hostnames to preserve cookies.

DebuggingOAuth2Security
0 likes · 9 min read
Troubleshooting Spring Boot OAuth2 Integration: Session Issues and Fixes
Top Architect
Top Architect
Apr 13, 2021 · Information Security

Design and Analysis of a Token‑Based Identity Authentication System

This article analyzes token‑based identity authentication in multi‑client information systems, classifies various token types, compares their natural and controllable attributes, and proposes a hierarchical token architecture that balances security, usability, and lifecycle management across web, mobile, and API scenarios.

APISessionaccess control
0 likes · 10 min read
Design and Analysis of a Token‑Based Identity Authentication System
php Courses
php Courses
Apr 13, 2021 · Backend Development

PHP Interview Questions and Answers: Functions, Variables, Sessions, Redis, and More

This article compiles essential PHP interview questions and answers covering output functions, string handling, error reporting, session vs cookie, GET vs POST, code execution results, URL encoding, character set conversion, array operations, Redis benefits, command‑line usage, crontab syntax, request flow, magic methods, and basic variable types.

BackendSessionVariables
0 likes · 10 min read
PHP Interview Questions and Answers: Functions, Variables, Sessions, Redis, and More