Tagged articles
54 articles
Page 1 of 1
Architect Chen
Architect Chen
Jan 8, 2026 · Information Security

How Single Sign-On (SSO) Simplifies Access Across Multiple Apps

Single Sign-On (SSO) lets users authenticate once and automatically gain access to all trusted applications, eliminating repeated logins and streamlining user experience across heterogeneous systems such as e‑commerce, payment, and collaboration platforms.

AuthenticationCASSSO
0 likes · 5 min read
How Single Sign-On (SSO) Simplifies Access Across Multiple Apps
Architect Chen
Architect Chen
Dec 25, 2025 · Information Security

Understanding Single Sign-On (SSO): Architecture, Components, and Workflow

This article explains the fundamentals of Single Sign-On (SSO), detailing its centralized authentication principle, the roles of CAS Server, CAS Client, and browser, and walks through the complete login flow with diagrams and code snippets for distributed systems.

AuthenticationCASDistributed Systems
0 likes · 4 min read
Understanding Single Sign-On (SSO): Architecture, Components, and Workflow
Lobster Programming
Lobster Programming
Aug 25, 2025 · Information Security

Storing User Sessions in SSO: Cookie+Session, Redis, and JWT Solutions

This article explains common approaches for storing user login state in distributed single sign‑on systems, covering the simple cookie‑plus‑session method, session storage in Redis for high‑availability, and token‑based JWT solutions, while discussing their architectures, advantages, and potential drawbacks.

JWTSession ManagementSingle Sign-On
0 likes · 6 min read
Storing User Sessions in SSO: Cookie+Session, Redis, and JWT Solutions
Architect's Guide
Architect's Guide
Aug 24, 2025 · Information Security

Master Session Management and SSO: From Cookies to CAS with Java Code

This article explains traditional session mechanisms, the challenges of session handling in clustered environments, explores session sharing strategies, introduces single sign‑on concepts, compares CAS and OAuth2, and provides complete Java code examples for implementing SSO with Redis.

CASSession ManagementSingle Sign-On
0 likes · 14 min read
Master Session Management and SSO: From Cookies to CAS with Java Code
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
May 29, 2025 · Information Security

How Single Sign-On (SSO) Works: Architecture and Flow Explained

This article explains the fundamentals of Single Sign-On (SSO), detailing its cross‑system authentication mechanism, core components such as CAS Server, CAS Client, and User Agent, and walks through the step‑by‑step flow that enables users to log in once and access multiple trusted applications seamlessly.

AuthenticationCASSSO
0 likes · 4 min read
How Single Sign-On (SSO) Works: Architecture and Flow Explained
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 20, 2024 · Information Security

Understanding Single Sign-On (SSO): Principles, Process, and Application Scenarios

This article explains the fundamentals, architecture, workflow, and practical scenarios of Single Sign-On (SSO), illustrating how a centralized authentication server enables users to log in once and seamlessly access multiple trusted applications, while also offering resources for deeper study.

AuthenticationInformation SecuritySSO
0 likes · 5 min read
Understanding Single Sign-On (SSO): Principles, Process, and Application Scenarios
Lobster Programming
Lobster Programming
Oct 23, 2024 · Backend Development

How to Enforce Single-Device Login with Session, Token, and JWT

This article explains three backend strategies—session‑cookie, token, and JWT—to ensure an account can only be active on one device at a time, detailing the workflow, data structures, and Redis integration needed to implement forced logout across multiple endpoints.

JWTSession ManagementSingle Sign-On
0 likes · 6 min read
How to Enforce Single-Device Login with Session, Token, and JWT
MaGe Linux Operations
MaGe Linux Operations
Oct 16, 2024 · Information Security

How to Build a Unified Enterprise SSO System with Go and Vue

This guide explains the challenges of multiple logins in enterprises, introduces Single Sign‑On concepts and protocols, and provides a step‑by‑step deployment of an open‑source Go‑Vue SSO solution, covering authentication methods, supported protocols, security features, and Docker‑based installation.

AuthenticationDockerGo
0 likes · 8 min read
How to Build a Unified Enterprise SSO System with Go and Vue
Top Architect
Top Architect
Jul 1, 2024 · Information Security

Understanding Single Sign-On (SSO) and CAS Authentication Flow

This article explains the concept, definitions, and three deployment types of Single Sign-On (SSO), introduces the Central Authentication Service (CAS) mechanism, and details step‑by‑step login and logout processes across multiple web applications, illustrating each flow with diagrams and examples.

AuthenticationCASSSO
0 likes · 12 min read
Understanding Single Sign-On (SSO) and CAS Authentication Flow
Java High-Performance Architecture
Java High-Performance Architecture
Jun 4, 2024 · Backend Development

Master Spring Security & JWT for Seamless Single Sign-On (SSO)

This comprehensive guide walks you through the concepts of Single Sign-On, the mechanics of JWT, RSA asymmetric encryption, and step‑by‑step integration of Spring Security with JWT, providing full Maven project setup, configuration files, utility classes, custom filters, and testing instructions for a robust distributed authentication system.

AuthenticationJWTSingle Sign-On
0 likes · 25 min read
Master Spring Security & JWT for Seamless Single Sign-On (SSO)
Architect Chen
Architect Chen
Mar 3, 2024 · Information Security

How CAS Single Sign-On Works: Mechanisms, Components, and Real‑World Use Cases

This article explains the Central Authentication Service (CAS) single sign‑on system, detailing its token‑based architecture, the roles of the CAS server, client, and protected services, and outlines typical scenarios such as e‑commerce, enterprise intranets, online platforms, and cloud services.

AuthenticationCASSSO
0 likes · 7 min read
How CAS Single Sign-On Works: Mechanisms, Components, and Real‑World Use Cases
Code Ape Tech Column
Code Ape Tech Column
Dec 19, 2023 · Information Security

Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms

This article explains the concept, advantages, and three implementation methods of Single Sign-On (SSO), then provides two complete practical examples—including architecture diagrams, step‑by‑step flows, and full Java code for ticket‑based and encrypted data‑based SSO—followed by supplementary RSA key generation notes and a brief promotional note.

AuthenticationBackendRSA
0 likes · 18 min read
Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms
Java Architect Essentials
Java Architect Essentials
Oct 31, 2023 · Information Security

Understanding Traditional Session Mechanisms, Cluster Session Challenges, and SSO Solutions with CAS and OAuth2

The article explains why multiple independent systems hurt user experience, reviews traditional session and cookie based authentication, discusses session sharing problems in clustered environments, and presents centralized Redis storage and CAS‑based single sign‑on solutions with code examples and a comparison to OAuth2.

CASOAuth2Single Sign-On
0 likes · 16 min read
Understanding Traditional Session Mechanisms, Cluster Session Challenges, and SSO Solutions with CAS and OAuth2
Architects Research Society
Architects Research Society
Jun 15, 2023 · Information Security

Understanding Federated Identity Management: Concepts, Roles, Benefits, and Use Cases

Federated identity management enables users to access multiple applications across trusted domains using a single digital identity, detailing its core roles, benefits, inbound/outbound federation, account linking, just‑in‑time provisioning, home‑realm discovery, and its use as an IAM transition strategy.

IAMSingle Sign-Onaccount linking
0 likes · 15 min read
Understanding Federated Identity Management: Concepts, Roles, Benefits, and Use Cases
Top Architect
Top Architect
Mar 13, 2023 · Information Security

Understanding Single Sign‑On (SSO) and CAS Authentication Flows

This article explains the concept, background, and definition of Single Sign‑On (SSO), outlines three SSO deployment types, introduces the Central Authentication Service (CAS) with detailed ticket mechanisms, and provides step‑by‑step SSO and Single Logout (SLO) processes for multiple applications.

AuthenticationCASInformation Security
0 likes · 11 min read
Understanding Single Sign‑On (SSO) and CAS Authentication Flows
Top Architect
Top Architect
Nov 18, 2022 · Information Security

Step-by-Step Guide to Building CAS Single Sign-On (SSO) with Spring Boot

This article provides a comprehensive tutorial on implementing Single Sign-On using the Central Authentication Service (CAS), covering its concepts, features, architecture, environment setup, server and client configuration, and testing procedures with detailed code examples for Java developers.

CASSSOSingle Sign-On
0 likes · 9 min read
Step-by-Step Guide to Building CAS Single Sign-On (SSO) with Spring Boot
Architect's Guide
Architect's Guide
Oct 15, 2022 · Information Security

Understanding Session Mechanisms, Cluster Session Challenges, and SSO Solutions with a CAS Implementation

This article explains traditional HTTP session handling, the problems of session sharing in clustered and multi‑service environments, and presents practical SSO solutions—including session replication, centralized Redis storage, and a complete CAS‑based single sign‑on implementation with Java code examples.

CASSessionSingle Sign-On
0 likes · 14 min read
Understanding Session Mechanisms, Cluster Session Challenges, and SSO Solutions with a CAS Implementation
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationAuthorizationJWT
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
Architect
Architect
Aug 3, 2022 · Information Security

Understanding Session Mechanisms, Session Sharing, and SSO with CAS Implementation

This article explains the challenges of multiple system logins, reviews traditional HTTP session handling, presents session sharing solutions like replication and Redis‑based central storage, and details a CAS‑based single sign‑on implementation with code examples, while also comparing CAS to OAuth2.

CASSession ManagementSingle Sign-On
0 likes · 13 min read
Understanding Session Mechanisms, Session Sharing, and SSO with CAS Implementation
Top Architect
Top Architect
Jul 11, 2022 · Information Security

Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot

This article explains how to integrate the CAS (Central Authentication Service) single sign‑on solution into a Spring Boot backend by adding necessary dependencies, configuring a series of CAS filters, creating a custom MyAuthenticationFilter to handle AJAX requests, and demonstrating a Vue.js frontend that interacts with the authentication flow, complete with screenshots of the login, ticket validation, and logout processes.

AuthenticationCASSingle Sign-On
0 likes · 14 min read
Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot
IT Architects Alliance
IT Architects Alliance
Jun 3, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign-On using the CAS (Central Authentication Service) framework, covering the concepts of SSO and CAS, required development environment, server-side deployment, client configuration, and end‑to‑end testing with detailed code examples.

AuthenticationCASSSO
0 likes · 8 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration
Java Interview Crash Guide
Java Interview Crash Guide
Jan 6, 2022 · Information Security

Mastering OAuth2 SSO: Real-World Scenarios and Spring Boot Guide

This article demystifies Single Sign-On using OAuth2.0 by illustrating the authentication and authorization flow through a real‑world analogy, explaining HTTP redirects, detailing the four grant types, and providing a complete Spring Boot implementation with role‑based access control for both client and server sides in microservice architectures.

AuthorizationOAuth2Single Sign-On
0 likes · 11 min read
Mastering OAuth2 SSO: Real-World Scenarios and Spring Boot Guide
Java Architect Essentials
Java Architect Essentials
Dec 15, 2021 · Information Security

Mastering Single Sign‑On: Principles, Architecture, and Java Implementation

This article explains the fundamentals of HTTP's stateless nature, session handling in single‑system web apps, the challenges of multi‑system environments, and presents a detailed walkthrough of Single Sign‑On concepts, token‑based authentication flow, global versus local sessions, deployment considerations, and a step‑by‑step Java implementation with code examples.

AuthenticationSSOSession Management
0 likes · 17 min read
Mastering Single Sign‑On: Principles, Architecture, and Java Implementation
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Oct 29, 2021 · Information Security

Understanding Single Sign-On (SSO): Why It Is Needed and How It Works

This article explains the necessity of Single Sign-On (SSO) in multi‑system environments, traces its origins from monolithic web applications to distributed clusters, and describes common implementation approaches for same‑domain and cross‑domain scenarios, including the use of a central authentication center such as CAS.

AuthenticationSSOSession
0 likes · 6 min read
Understanding Single Sign-On (SSO): Why It Is Needed and How It Works
Top Architect
Top Architect
Aug 11, 2021 · Backend Development

Eight-Step User Authentication with JWT

This article explains an eight‑step JWT‑based user authentication flow, covering secure credential transmission, database verification, token creation, HttpOnly cookie handling, request validation, payload decoding, session versus JWT comparison, and cross‑domain single sign‑on configuration.

AuthenticationJWTSingle Sign-On
0 likes · 5 min read
Eight-Step User Authentication with JWT
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Jul 22, 2021 · Information Security

Mastering CAS-Based Single Sign-On: From Session Mechanics to Seamless Logout

This article explains a complete CAS-based single sign‑on solution, covering traditional session mechanisms, the CAS architecture, implementation of single sign‑on, session renewal, single logout, and practical extensions for multi‑system integration to ensure secure and seamless user experiences across enterprise applications.

AuthenticationCASInformation Security
0 likes · 12 min read
Mastering CAS-Based Single Sign-On: From Session Mechanics to Seamless Logout
Programmer DD
Programmer DD
May 7, 2021 · Information Security

Mastering Single Sign-On: From Session Basics to Java Implementation

This article explains the stateless nature of HTTP, how session mechanisms and cookies enable login state, why single-system login fails in multi‑system environments, and provides a step‑by‑step Java implementation of Single Sign‑On with token generation, validation, and logout handling.

SSOSession ManagementSingle Sign-On
0 likes · 16 min read
Mastering Single Sign-On: From Session Basics to Java Implementation
Fulu Network R&D Team
Fulu Network R&D Team
Nov 9, 2020 · Backend Development

Unified Authentication and Authorization Service – Technical Overview and Quick‑Start Guide

This article introduces the background, technical stack, core features, step‑by‑step deployment instructions, and future plans of a .NET Core and React based unified authentication and authorization system designed to replace disparate login mechanisms across multiple company applications.

.NET CoreAuthorizationIdentityServer4
0 likes · 7 min read
Unified Authentication and Authorization Service – Technical Overview and Quick‑Start Guide
Java Architecture Diary
Java Architecture Diary
Apr 29, 2020 · Backend Development

Enforcing Single-Device Login with Spring Security OAuth2

This article explains how to modify Spring Security OAuth2's token service to enforce a single-device login by customizing token creation and key generation logic, removing existing tokens for the same user and ignoring client identifiers, with code examples and deployment steps.

OAuth2Single Sign-OnToken Service
0 likes · 5 min read
Enforcing Single-Device Login with Spring Security OAuth2
21CTO
21CTO
Dec 16, 2019 · Information Security

How SSO Works: From CAS Architecture to Real‑World Implementation

This article explains the background, architecture, and step‑by‑step authentication flow of Single Sign‑On systems, covering the classic CAS framework, Java implementation details, and Taobao's extended SSO design with code examples.

AuthenticationCASSSO
0 likes · 8 min read
How SSO Works: From CAS Architecture to Real‑World Implementation
Selected Java Interview Questions
Selected Java Interview Questions
Nov 2, 2019 · Information Security

Understanding Single Sign-On (SSO) Mechanisms: Shared Session, OpenID, Cookie, and Cross‑Domain Solutions

This article explains the principles of single sign‑on and compares several practical implementations—including shared session via Redis, OpenID‑based authentication, cookie‑based OpenID storage, and cross‑domain JSONP techniques—while also discussing their limitations and security considerations.

AuthenticationInformation SecurityOpenID
0 likes · 8 min read
Understanding Single Sign-On (SSO) Mechanisms: Shared Session, OpenID, Cookie, and Cross‑Domain Solutions
21CTO
21CTO
Oct 2, 2019 · Information Security

Mastering SSO: Session Sharing, OpenID, and Cross‑Domain Strategies

This article explores practical approaches to Single Sign‑On, comparing shared Session, OpenID‑based, and cookie‑based implementations, addressing scalability, cross‑domain challenges, and security considerations to help developers choose the right SSO solution for their architecture.

AuthenticationOpenIDSSO
0 likes · 8 min read
Mastering SSO: Session Sharing, OpenID, and Cross‑Domain Strategies
58 Tech
58 Tech
Oct 10, 2018 · Information Security

Account Integration Solutions for 58 Group: Merging, Linking, and Cloud Account Platform

This article examines the challenges of unifying multiple independent account systems within 58 Group and presents three technical approaches—full account merging, account linking with single sign‑on, and a unified cloud account platform—detailing their benefits, difficulties, and implementation considerations.

AuthenticationSingle Sign-Onaccount-integration
0 likes · 11 min read
Account Integration Solutions for 58 Group: Merging, Linking, and Cloud Account Platform
Big Data and Microservices
Big Data and Microservices
Aug 4, 2018 · Information Security

How CAS Enables Secure Single Sign-On: Architecture and Workflow Explained

CAS (Central Authentication Service) is an open‑source, enterprise‑grade single sign‑on solution that centralizes user authentication across trusted systems, offering reduced login time, improved security, and streamlined user management, with a clear protocol flow involving service tickets, redirects, and encrypted cookies.

AuthenticationCASSSO
0 likes · 5 min read
How CAS Enables Secure Single Sign-On: Architecture and Workflow Explained
Programmer DD
Programmer DD
Apr 18, 2018 · Information Security

Mastering JWT-Based User Authentication: An 8‑Step Guide

This article walks through an eight‑step JWT authentication flow, explaining how to securely transmit user IDs via cookies, verify tokens on each request, compare JWT with traditional session storage, and configure domain‑wide cookies for single sign‑on across subdomains.

AuthenticationCookieJWT
0 likes · 7 min read
Mastering JWT-Based User Authentication: An 8‑Step Guide
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Dec 19, 2016 · Information Security

Mastering Single Sign-On (SSO): Architecture, Implementation, and Performance Insights

This comprehensive article explores the business need for Single Sign-On, explains its internal ticket‑based mechanisms, presents detailed Web‑SSO and desktop SSO implementations with full source code, analyzes security and performance risks, and offers step‑by‑step deployment guidance for Java/J2EE environments.

J2EESSOSingle Sign-On
0 likes · 21 min read
Mastering Single Sign-On (SSO): Architecture, Implementation, and Performance Insights
21CTO
21CTO
Oct 28, 2015 · Information Security

How Single Sign-On Works: Trust Storage, Validation, and Secure Implementation

This article explains the concept of Single Sign-On (SSO), why it’s essential for large web platforms, the core steps of storing and validating trust, common cookie‑based approaches, their security drawbacks, and how server‑side solutions using distributed caches and digital signatures can provide a robust, cross‑domain authentication system.

AuthenticationCookieSSO
0 likes · 5 min read
How Single Sign-On Works: Trust Storage, Validation, and Secure Implementation
21CTO
21CTO
Oct 15, 2015 · Information Security

How Single Sign-On (SSO) Boosts Enterprise Efficiency and Security

The article explains why enterprises need a unified Single Sign-On (SSO) system, detailing its benefits for user convenience, administrator workload reduction, security improvements, and integration standards, while comparing cookie‑ and session‑based implementations and illustrating the CAS open‑source solution.

AuthenticationCASEnterprise
0 likes · 15 min read
How Single Sign-On (SSO) Boosts Enterprise Efficiency and Security