Tagged articles
141 articles
Page 1 of 2
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Feb 11, 2026 · Information Security

Mastering Single Sign-On: Cookie, Token, and CAS Approaches Explained

This article explains three core Single Sign-On architectures—same‑domain cookie/session, distributed token‑based (JWT/OAuth2), and Central Authentication Service—detailing their workflows, advantages, drawbacks, and ideal use cases, helping architects choose the right SSO solution for web, mobile, and micro‑service environments.

AuthenticationCASOAuth2
0 likes · 5 min read
Mastering Single Sign-On: Cookie, Token, and CAS Approaches Explained
Architect's Guide
Architect's Guide
Jan 11, 2026 · Information Security

10 Common Authentication Techniques Explained: From Basic Auth to OAuth and QR‑Login

This article systematically introduces ten widely used authentication methods—including HTTP Basic Auth, Session‑Cookie, Token, JWT, Single Sign‑On, OAuth 2.0, federated login, unique‑device login, QR‑code login, and one‑click mobile login—explaining their principles, workflows, advantages, drawbacks, and typical implementation libraries.

AuthenticationJWTOAuth
0 likes · 45 min read
10 Common Authentication Techniques Explained: From Basic Auth to OAuth and QR‑Login
Architect Chen
Architect Chen
Jan 8, 2026 · Information Security

How Single Sign-On (SSO) Simplifies Access Across Multiple Apps

Single Sign-On (SSO) lets users authenticate once and automatically gain access to all trusted applications, eliminating repeated logins and streamlining user experience across heterogeneous systems such as e‑commerce, payment, and collaboration platforms.

AuthenticationCASSSO
0 likes · 5 min read
How Single Sign-On (SSO) Simplifies Access Across Multiple Apps
Tech Freedom Circle
Tech Freedom Circle
Dec 31, 2025 · Information Security

Unified SSO via Gateway: Multi‑App Auth & Authz and JWT vs Auth vs Authz

This article walks through a complete design and implementation of a unified single sign‑on system using OAuth2.0 authorization‑code flow, Spring Cloud Gateway, JWT, Redis, and Nacos, comparing JWT, authentication, and authorization while presenting performance metrics, security considerations, and interview‑ready answers.

AuthenticationAuthorizationJWT
0 likes · 59 min read
Unified SSO via Gateway: Multi‑App Auth & Authz and JWT vs Auth vs Authz
Architect Chen
Architect Chen
Dec 25, 2025 · Information Security

Understanding Single Sign-On (SSO): Architecture, Components, and Workflow

This article explains the fundamentals of Single Sign-On (SSO), detailing its centralized authentication principle, the roles of CAS Server, CAS Client, and browser, and walks through the complete login flow with diagrams and code snippets for distributed systems.

AuthenticationCASDistributed Systems
0 likes · 4 min read
Understanding Single Sign-On (SSO): Architecture, Components, and Workflow
Lobster Programming
Lobster Programming
Dec 23, 2025 · Information Security

Understanding the Difference Between SSO and OAuth2.0: Authentication vs Authorization

SSO (Single Sign‑On) and OAuth2.0 are both widely used identity frameworks; SSO handles user authentication across multiple applications with a single login, while OAuth2.0 is an authorization protocol that lets users grant third‑party apps limited access to resources without sharing passwords.

AuthenticationAuthorizationIdentity Management
0 likes · 6 min read
Understanding the Difference Between SSO and OAuth2.0: Authentication vs Authorization
Top Architect
Top Architect
Nov 1, 2025 · Information Security

Mastering CAS SSO: Step‑by‑Step Guide to Build Single Sign‑On with Java

This article explains the concepts of Single Sign‑On (SSO) and the Central Authentication Service (CAS), then provides a detailed, code‑rich tutorial for setting up a CAS server, configuring clients, disabling HTTPS for development, and testing the end‑to‑end SSO workflow using Java and Spring.

AuthenticationCASJava
0 likes · 10 min read
Mastering CAS SSO: Step‑by‑Step Guide to Build Single Sign‑On with Java
Linux Ops Smart Journey
Linux Ops Smart Journey
Oct 28, 2025 · Operations

Enable Keycloak SSO for Nightingale Monitoring with OAuth2/OIDC

This guide walks you through configuring Keycloak as an OAuth2/OIDC identity provider for Nightingale monitoring, covering prerequisites, client and user creation in Keycloak, Nightingale OIDC settings, and verification steps to achieve seamless single sign‑on in enterprise environments.

Identity ManagementKeycloakOAuth2
0 likes · 6 min read
Enable Keycloak SSO for Nightingale Monitoring with OAuth2/OIDC
Code Ape Tech Column
Code Ape Tech Column
Jun 12, 2025 · Information Security

How to Build Single Sign‑On (SSO) with CAS and Session Sharing in Java

This article explains why multiple independent login systems hurt user experience and security, reviews traditional session mechanisms and their limitations in clustered environments, and then presents two session‑sharing strategies and a complete CAS‑based SSO solution with Java code examples.

AuthenticationCASJava
0 likes · 15 min read
How to Build Single Sign‑On (SSO) with CAS and Session Sharing in Java
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
May 29, 2025 · Information Security

How Single Sign-On (SSO) Works: Architecture and Flow Explained

This article explains the fundamentals of Single Sign-On (SSO), detailing its cross‑system authentication mechanism, core components such as CAS Server, CAS Client, and User Agent, and walks through the step‑by‑step flow that enables users to log in once and access multiple trusted applications seamlessly.

AuthenticationCASSSO
0 likes · 4 min read
How Single Sign-On (SSO) Works: Architecture and Flow Explained
Top Architect
Top Architect
Dec 22, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article provides a comprehensive overview of OAuth2.0, explaining its core concepts, the roles of resource owner, client, authorization server, and resource server, illustrating the full authorization flow with diagrams, clarifying related terminology such as authentication, delegation, and roles, and finally noting additional promotional material.

AuthorizationOAuth2.0SSO
0 likes · 14 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 21, 2024 · Information Security

Mastering Single Sign-On (SSO): Principles, Tokens, and Real-World Applications

This article provides a comprehensive overview of Single Sign-On (SSO), explaining its core concepts, authentication flow, token generation and validation, and practical use cases across enterprises, education, finance, and e‑commerce, while also offering insights into security benefits and implementation details.

AuthenticationSSOSecurity
0 likes · 5 min read
Mastering Single Sign-On (SSO): Principles, Tokens, and Real-World Applications
MaGe Linux Operations
MaGe Linux Operations
Oct 16, 2024 · Information Security

How to Build a Unified Enterprise SSO System with Go and Vue

This guide explains the challenges of multiple logins in enterprises, introduces Single Sign‑On concepts and protocols, and provides a step‑by‑step deployment of an open‑source Go‑Vue SSO solution, covering authentication methods, supported protocols, security features, and Docker‑based installation.

AuthenticationDockerGo
0 likes · 8 min read
How to Build a Unified Enterprise SSO System with Go and Vue
Top Architect
Top Architect
Aug 29, 2024 · Backend Development

Implementing Single Sign-On (SSO) with CAS and Session Management in Java

This article explains traditional session mechanisms, challenges in clustered environments, and presents solutions such as session replication and centralized storage, then details the design and implementation of a CAS-based Single Sign-On system in Java, including code for user forms, controllers, filters, and configuration.

Backend DevelopmentCASJava
0 likes · 17 min read
Implementing Single Sign-On (SSO) with CAS and Session Management in Java
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Aug 28, 2024 · Information Security

Understanding Single Sign-On (SSO): Principles, Implementation Steps, Challenges, and Applications

This article explains the concept of Single Sign‑On (SSO), outlines its implementation process—including user redirection, token generation, and cross‑system authentication—discusses challenges such as single point of failure, complexity, and cross‑domain issues, and highlights typical use cases in enterprise and e‑commerce environments.

SSOSecurityenterprise architecture
0 likes · 6 min read
Understanding Single Sign-On (SSO): Principles, Implementation Steps, Challenges, and Applications
Architect's Guide
Architect's Guide
Aug 12, 2024 · Information Security

Implementing Single Sign-On (SSO) with CAS and Session Management in Distributed Backend Systems

This article explains the challenges of multiple product logins, reviews traditional session mechanisms, discusses session sharing solutions in clustered environments, and presents a CAS‑based single sign‑on implementation with Java code examples, highlighting differences between CAS and OAuth2 for secure authentication.

BackendCASJava
0 likes · 13 min read
Implementing Single Sign-On (SSO) with CAS and Session Management in Distributed Backend Systems
Top Architect
Top Architect
Jul 13, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the OAuth2.0 authorization protocol, distinguishes it from single sign‑on, describes its core entities and step‑by‑step flow, and outlines how web servers, user agents, and native applications interact to securely obtain access tokens for protected resources.

AuthenticationAuthorizationBackend Development
0 likes · 12 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Top Architect
Top Architect
Jul 1, 2024 · Information Security

Understanding Single Sign-On (SSO) and CAS Authentication Flow

This article explains the concept, definitions, and three deployment types of Single Sign-On (SSO), introduces the Central Authentication Service (CAS) mechanism, and details step‑by‑step login and logout processes across multiple web applications, illustrating each flow with diagrams and examples.

AuthenticationCASSSO
0 likes · 12 min read
Understanding Single Sign-On (SSO) and CAS Authentication Flow
Eric Tech Circle
Eric Tech Circle
Jun 30, 2024 · Information Security

Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide

This article provides a comprehensive walkthrough of Single Sign‑On (SSO) concepts, common protocols, login flow diagrams, and multiple implementation options, then dives into step‑by‑step deployment of an enterprise‑grade SSO system using Keycloak with Docker or Kubernetes, including configuration, client setup, custom extensions, and practical code snippets.

AuthenticationDockerJWT
0 likes · 17 min read
Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide
Java High-Performance Architecture
Java High-Performance Architecture
May 17, 2024 · Information Security

How MaxKey SSO Delivers Secure, Scalable Single Sign‑On for Enterprises

MaxKey is an enterprise‑grade single sign‑on solution that supports OAuth 2.x, OpenID Connect, SAML 2.0, JWT, CAS and SCIM, offering secure identity management, RBAC, multi‑tenant capabilities, robust password policies, brute‑force protection, session control, and BCrypt‑based password encryption.

AuthenticationIdentity ManagementJava
0 likes · 11 min read
How MaxKey SSO Delivers Secure, Scalable Single Sign‑On for Enterprises
php Courses
php Courses
May 16, 2024 · Backend Development

Implementing OAuth2 Single Sign-On (SSO) in Laravel with Passport

This guide walks through integrating OAuth2 Single Sign-On into a Laravel application using Laravel Passport, covering prerequisites, installation steps, configuration of the authentication server and client, testing procedures, and common troubleshooting tips to enhance security and user experience.

LaravelOAuth2PHP
0 likes · 9 min read
Implementing OAuth2 Single Sign-On (SSO) in Laravel with Passport
Top Architect
Top Architect
Mar 20, 2024 · Information Security

Understanding Single Sign-On (SSO) and OAuth2.0: Types, Implementations, and Frameworks

This article explains how Single Sign-On (SSO) and OAuth2.0 enable seamless authentication across micro‑service applications, compares session‑based, token‑based, OAuth‑based, and SAML‑based SSO approaches, outlines OAuth2.0 grant types, and introduces popular frameworks such as Spring Security OAuth, Keycloak, and Apache Oltu.

OAuth2.0SSOSecurity
0 likes · 11 min read
Understanding Single Sign-On (SSO) and OAuth2.0: Types, Implementations, and Frameworks
Architect Chen
Architect Chen
Mar 3, 2024 · Information Security

How CAS Single Sign-On Works: Mechanisms, Components, and Real‑World Use Cases

This article explains the Central Authentication Service (CAS) single sign‑on system, detailing its token‑based architecture, the roles of the CAS server, client, and protected services, and outlines typical scenarios such as e‑commerce, enterprise intranets, online platforms, and cloud services.

AuthenticationCASSSO
0 likes · 7 min read
How CAS Single Sign-On Works: Mechanisms, Components, and Real‑World Use Cases
Architect
Architect
Feb 19, 2024 · Information Security

Mastering Single Sign-On: From Session Basics to CAS Implementation

This article walks through the fundamentals of HTTP session handling, the challenges of session sharing in clustered environments, and presents a step‑by‑step design of a Single Sign‑On solution using CAS, including concrete code examples, Redis‑based session storage, and a comparison with OAuth2.

AuthenticationCASJava
0 likes · 17 min read
Mastering Single Sign-On: From Session Basics to CAS Implementation
macrozheng
macrozheng
Dec 30, 2023 · Backend Development

Master Single Sign-On (SSO) with SpringBoot, Vue & Uni‑App: A Hands‑On Guide

This article explains the concept, advantages, and implementation methods of Single Sign‑On (SSO) and provides two complete hands‑on examples—including architecture diagrams, database schema, configuration, and Java code for token‑based, ticket‑based, and RSA/AES encrypted SSO flows—using SpringBoot, Vue and Uni‑App.

AuthenticationJavaMicroservices
0 likes · 18 min read
Master Single Sign-On (SSO) with SpringBoot, Vue & Uni‑App: A Hands‑On Guide
Code Ape Tech Column
Code Ape Tech Column
Dec 19, 2023 · Information Security

Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms

This article explains the concept, advantages, and three implementation methods of Single Sign-On (SSO), then provides two complete practical examples—including architecture diagrams, step‑by‑step flows, and full Java code for ticket‑based and encrypted data‑based SSO—followed by supplementary RSA key generation notes and a brief promotional note.

AuthenticationBackendJava
0 likes · 18 min read
Implementation of Single Sign-On (SSO) with Service A and Service B Using Ticket and Token Mechanisms
Top Architect
Top Architect
Oct 16, 2023 · Information Security

Understanding SSO and OAuth2.0: Concepts, Processes, and Differences

This article explains the fundamentals of Single Sign‑On (SSO) and OAuth2.0, compares their token‑based authentication mechanisms, details typical implementation flows such as CAS, and clarifies the distinctions among SSO, OAuth2, JWT, Spring Security and Shiro, while also noting related promotional content.

CASOAuth2SSO
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Processes, and Differences
Top Architect
Top Architect
Sep 18, 2023 · Information Security

Understanding Cookie‑Based Single Sign‑On and CAS Authentication Flow

This article reviews the shortcomings of simple cookie‑based single sign‑on, introduces a unified authentication center architecture, explains the Central Authentication Service (CAS) design and its deployment, and walks through the complete login process—including first, second, and cross‑domain accesses—highlighting key tickets, filters, and session handling.

CASJavaSSO
0 likes · 12 min read
Understanding Cookie‑Based Single Sign‑On and CAS Authentication Flow
php Courses
php Courses
May 28, 2023 · Backend Development

Implementing Single Sign-On (SSO) with PHP: A Step-by-Step Guide

This tutorial explains how to build a PHP-based single sign‑on system using a main login application, a shared authentication service backed by MySQL and Redis, and multiple external applications, providing complete code examples for database setup, login handling, session sharing, and logout.

AuthenticationPHPSSO
0 likes · 8 min read
Implementing Single Sign-On (SSO) with PHP: A Step-by-Step Guide
Programmer DD
Programmer DD
Apr 24, 2023 · Information Security

Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works

This article explains the concepts, workflows, and key differences between Single Sign‑On (SSO) and OAuth2.0, illustrating how token‑based authentication replaces passwords, detailing typical CAS‑based SSO steps, OAuth2.0 authorization‑code flow, and clarifying related terminology and grant types.

AuthorizationCASOAuth2.0
0 likes · 9 min read
Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works
Architect's Guide
Architect's Guide
Apr 20, 2023 · Information Security

OAuth 2.0: Principles, Architecture, and Implementation Overview

This article explains the fundamental concepts, roles, and step‑by‑step flow of OAuth 2.0, compares it with single sign‑on, describes the architecture of authorization, resource, and client servers, and clarifies related terminology such as authentication, federation, and delegated access.

APIAuthenticationOAuth2.0
0 likes · 11 min read
OAuth 2.0: Principles, Architecture, and Implementation Overview
Top Architect
Top Architect
Mar 13, 2023 · Information Security

Understanding Single Sign‑On (SSO) and CAS Authentication Flows

This article explains the concept, background, and definition of Single Sign‑On (SSO), outlines three SSO deployment types, introduces the Central Authentication Service (CAS) with detailed ticket mechanisms, and provides step‑by‑step SSO and Single Logout (SLO) processes for multiple applications.

AuthenticationCASSSO
0 likes · 11 min read
Understanding Single Sign‑On (SSO) and CAS Authentication Flows
Java Architecture Diary
Java Architecture Diary
Mar 13, 2023 · Information Security

Why MaxKey Stands Out as a Leading Open-Source SSO Solution

MaxKey is an open-source, Apache-licensed SSO platform that supports major authentication protocols, offers extensive login methods, provides multi-tenant IAM features, and includes detailed Linux deployment steps with code snippets and interface screenshots, making it a comprehensive solution for enterprise identity management.

AuthenticationIAMJava
0 likes · 6 min read
Why MaxKey Stands Out as a Leading Open-Source SSO Solution
IT Architects Alliance
IT Architects Alliance
Jan 27, 2023 · Backend Development

Mastering Session Management and SSO: From Cookies to CAS with Redis

This article analyzes the limitations of traditional HTTP session mechanisms in single‑server and clustered environments, explains why session sharing is essential for multi‑system products, and presents practical solutions such as session replication and centralized Redis storage, followed by a detailed walkthrough of CAS‑based single sign‑on implementation with Java Spring code examples and a comparison to OAuth2.

AuthenticationCASJava
0 likes · 15 min read
Mastering Session Management and SSO: From Cookies to CAS with Redis
Java High-Performance Architecture
Java High-Performance Architecture
Dec 24, 2022 · Information Security

Master OAuth2 SSO with Spring Security and JWT: A Complete Step‑by‑Step Guide

This tutorial walks through building a single sign‑on (SSO) solution using OAuth2, Spring Security, and JWT in a Java Spring Boot backend, covering preparation, Maven dependencies, server and client configurations, custom login pages, token handling, logout strategies, project structure, and a full demo with source code.

JWTJavaOAuth2
0 likes · 25 min read
Master OAuth2 SSO with Spring Security and JWT: A Complete Step‑by‑Step Guide
Top Architect
Top Architect
Nov 23, 2022 · Information Security

Comprehensive Guide to Front‑End Authentication and Authorization Methods

This article provides an in‑depth overview of authentication, authorization, and permission control concepts and compares ten common front‑end authentication techniques—including HTTP Basic Auth, Session‑Cookie, Token, JWT, SSO, OAuth 2.0, QR‑code login and one‑click login—detailing their workflows, advantages, drawbacks, and typical usage scenarios.

AuthenticationAuthorizationJWT
0 likes · 39 min read
Comprehensive Guide to Front‑End Authentication and Authorization Methods
Architect
Architect
Nov 19, 2022 · Information Security

Understanding SSO and OAuth2.0: Concepts, Differences, and Implementation

This article explains the principles of Single Sign-On (SSO) and OAuth2.0, compares their concepts, outlines typical SSO workflows using CAS, details OAuth2.0 authorization code flow, clarifies terminology differences, and discusses related security frameworks such as Spring Security and Shiro.

AuthenticationOAuth2.0SSO
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Differences, and Implementation
Top Architect
Top Architect
Nov 18, 2022 · Information Security

Step-by-Step Guide to Building CAS Single Sign-On (SSO) with Spring Boot

This article provides a comprehensive tutorial on implementing Single Sign-On using the Central Authentication Service (CAS), covering its concepts, features, architecture, environment setup, server and client configuration, and testing procedures with detailed code examples for Java developers.

CASJavaSSO
0 likes · 9 min read
Step-by-Step Guide to Building CAS Single Sign-On (SSO) with Spring Boot
IT Architects Alliance
IT Architects Alliance
Nov 17, 2022 · Information Security

Comprehensive Guide to Frontend Authentication Methods and Their Differences

This article explains the concepts, relationships, and practical implementations of authentication, authorization, and access control, and compares ten common frontend authentication methods—including HTTP Basic, Session‑Cookie, Token, JWT, SSO, OAuth, and QR‑code login—detailing their workflows, advantages, disadvantages, and suitable scenarios.

JWTOAuthSSO
0 likes · 37 min read
Comprehensive Guide to Frontend Authentication Methods and Their Differences
Code Ape Tech Column
Code Ape Tech Column
Nov 15, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation

This article explains the principles and workflow of Single Sign‑On using OAuth2.0, illustrates the process with a real‑life analogy, and provides a complete Spring Boot example—including authorization server, client configuration, and role‑based access control—suitable for microservice architectures.

AuthenticationAuthorizationMicroservices
0 likes · 12 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Its Spring Boot Implementation
Code Ape Tech Column
Code Ape Tech Column
Nov 7, 2022 · Information Security

Understanding Session-Based Authentication and Single Sign-On (SSO) with CAS and OAuth2

This article explains the challenges of multiple product systems, reviews traditional session mechanisms and their limitations in clustered environments, compares session replication and centralized storage using Redis, and details the design and implementation of Single Sign-On using CAS and OAuth2 with Java Spring code examples.

CASJavaOAuth2
0 likes · 13 min read
Understanding Session-Based Authentication and Single Sign-On (SSO) with CAS and OAuth2
IT Architects Alliance
IT Architects Alliance
Oct 11, 2022 · Information Security

Understanding SSO: When to Choose SAML vs OAuth2 & OIDC

This article explains the fundamentals of Single Sign‑On (SSO), compares the two most common protocols—SAML and OAuth2 (with OpenID Connect)—covers their terminology, workflows, benefits, and provides guidance on which to use in different scenarios.

AuthenticationIdentity ManagementOAuth2
0 likes · 10 min read
Understanding SSO: When to Choose SAML vs OAuth2 & OIDC
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Sep 29, 2022 · Information Security

Understanding SSO: When to Use SAML vs OAuth2 & OIDC

This article explains single sign‑on concepts, compares SAML, OAuth2 and OpenID Connect, outlines their benefits and typical workflows, and provides guidance on choosing the right protocol for different security and user‑experience scenarios.

AuthenticationAuthorizationOAuth2
0 likes · 9 min read
Understanding SSO: When to Use SAML vs OAuth2 & OIDC
Top Architect
Top Architect
Aug 26, 2022 · Information Security

Understanding Session Management, SSO, and CAS Implementation in Java

This article explains the challenges of traditional session mechanisms in distributed systems, explores session sharing solutions such as replication and centralized storage, details the design and flow of Single Sign‑On (SSO) using CAS, compares CAS with OAuth2, and provides complete Java code examples for a demo implementation.

CASJavaSSO
0 likes · 14 min read
Understanding Session Management, SSO, and CAS Implementation in Java
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationAuthorizationJWT
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
IT Architects Alliance
IT Architects Alliance
Aug 4, 2022 · Information Security

Understanding Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation

This article explains traditional session and authentication mechanisms, the problems of session sharing in clustered and multi‑service environments, and presents practical SSO solutions—including CAS‑based single sign‑on and its differences from OAuth2—accompanied by complete Java Spring code examples.

AuthenticationCASJava
0 likes · 16 min read
Understanding Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation
Programmer DD
Programmer DD
Aug 4, 2022 · Backend Development

Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2

This article explains the limitations of traditional HTTP session mechanisms, explores session sharing strategies in clustered environments, and provides a detailed walkthrough of implementing Single Sign-On using CAS, including code samples and a comparison with OAuth2 authentication.

AuthenticationCASJava
0 likes · 18 min read
Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2
Java Backend Technology
Java Backend Technology
Jul 31, 2022 · Backend Development

Mastering Single Sign-On (SSO) with CAS: From Session Basics to Full Demo

This article explains why unified authentication is essential for product suites, reviews traditional session mechanisms and their limitations in clustered environments, explores session‑sharing strategies, introduces CAS‑based SSO workflows, compares CAS with OAuth2, and provides a complete Spring Boot demo with code snippets and configuration details.

AuthenticationCASSSO
0 likes · 17 min read
Mastering Single Sign-On (SSO) with CAS: From Session Basics to Full Demo
Architecture Digest
Architecture Digest
Jul 17, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Java Backend

This tutorial explains what SSO and CAS are, outlines the required development environment, walks through downloading, building, and deploying the CAS Server, shows how to configure the server and client (including disabling HTTPS for testing), and demonstrates successful cross‑application authentication with code examples.

AuthenticationCASJava
0 likes · 7 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Java Backend
IT Architects Alliance
IT Architects Alliance
Jun 3, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign-On using the CAS (Central Authentication Service) framework, covering the concepts of SSO and CAS, required development environment, server-side deployment, client configuration, and end‑to‑end testing with detailed code examples.

AuthenticationCASJava
0 likes · 8 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration
Top Architect
Top Architect
May 29, 2022 · Information Security

Step‑by‑Step Guide to Building a CAS‑Based Single Sign‑On (SSO) System with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign‑On using the open‑source CAS solution, covering the concepts of SSO and CAS, required development environment, server‑side deployment, client integration with Spring Boot, configuration details, and a complete end‑to‑end testing workflow.

AuthenticationCASJava
0 likes · 9 min read
Step‑by‑Step Guide to Building a CAS‑Based Single Sign‑On (SSO) System with Server and Client Configuration
SQB Blog
SQB Blog
Apr 26, 2022 · Frontend Development

How Micro‑Frontend Architecture Transformed a Massive Ops Management Platform

This article explains how a large, monolithic internal operations management system was refactored into a micro‑frontend architecture, detailing the container framework, SSO integration, resource‑permission system, communication mechanisms, and the resulting benefits for independent team development and performance.

Frontend ArchitectureSSOcontainer framework
0 likes · 11 min read
How Micro‑Frontend Architecture Transformed a Massive Ops Management Platform
Baidu Geek Talk
Baidu Geek Talk
Apr 25, 2022 · Information Security

Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC

Baidu’s ToB Account Permission Platform provides a unified, configurable login and permission service—including multi‑tenant account management, SSO, OAuth, and the GD‑RBAC model—delivering secure, high‑performance access for over ten million enterprise accounts across multiple product lines.

AuthenticationAuthorizationBackend
0 likes · 27 min read
Design and Implementation of Baidu ToB Account Permission Platform: Login Services, SSO, OAuth, and GD‑RBAC
IT Architects Alliance
IT Architects Alliance
Apr 22, 2022 · Information Security

Implementing Single Sign-On with Spring Security and JWT – A Comprehensive Guide

This article provides a detailed, step‑by‑step tutorial on building a Spring Security‑based Single Sign‑On solution using JWT, covering SSO concepts, JWT structure, RSA encryption, custom authentication filters, Maven project setup, configuration files, and full code examples for both authentication and resource services.

AuthenticationJWTJava
0 likes · 22 min read
Implementing Single Sign-On with Spring Security and JWT – A Comprehensive Guide
Top Architect
Top Architect
Apr 21, 2022 · Information Security

Implementing Single Sign-On with Spring Security and JWT

This article provides a comprehensive 20,000‑word guide on building a Spring Security‑based single sign‑on solution using JWT, covering the SSO concept, token structure, RSA encryption, Maven project setup, configuration files, custom authentication and verification filters, and end‑to‑end testing with Postman.

AuthenticationJWTJava
0 likes · 23 min read
Implementing Single Sign-On with Spring Security and JWT
Architecture Digest
Architecture Digest
Jan 17, 2022 · Information Security

Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation

This article explains the principles and workflow of Single Sign-On (SSO) using OAuth2.0, illustrates the process with a real‑life scenario, compares multi‑point and single‑point login, and provides a complete Spring Boot example for building an authorization server, client, and role‑based access control in micro‑service architectures.

AuthenticationAuthorizationMicroservices
0 likes · 10 min read
Understanding Single Sign-On (SSO) with OAuth2.0 and Spring Boot Implementation
ELab Team
ELab Team
Dec 24, 2021 · Information Security

Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation

This article explores the challenges of cross‑domain login state sharing, compares JWT, session‑cookie, and SSO solutions such as CAS and OAuth, details their structures, security considerations, and provides a step‑by‑step guide to building a simple SSO demo with code snippets and diagrams.

CASJWTOAuth
0 likes · 25 min read
Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation
Java Architect Essentials
Java Architect Essentials
Dec 15, 2021 · Information Security

Mastering Single Sign‑On: Principles, Architecture, and Java Implementation

This article explains the fundamentals of HTTP's stateless nature, session handling in single‑system web apps, the challenges of multi‑system environments, and presents a detailed walkthrough of Single Sign‑On concepts, token‑based authentication flow, global versus local sessions, deployment considerations, and a step‑by‑step Java implementation with code examples.

AuthenticationJavaSSO
0 likes · 17 min read
Mastering Single Sign‑On: Principles, Architecture, and Java Implementation
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Oct 29, 2021 · Information Security

Understanding Single Sign-On (SSO): Why It Is Needed and How It Works

This article explains the necessity of Single Sign-On (SSO) in multi‑system environments, traces its origins from monolithic web applications to distributed clusters, and describes common implementation approaches for same‑domain and cross‑domain scenarios, including the use of a central authentication center such as CAS.

AuthenticationSSOSecurity
0 likes · 6 min read
Understanding Single Sign-On (SSO): Why It Is Needed and How It Works
Code Ape Tech Column
Code Ape Tech Column
Oct 29, 2021 · Information Security

Understanding OAuth2 Single Sign-On (SSO) and Its Spring Boot Implementation

This article explains the principles of Single Sign-On using OAuth2.0, illustrates the flow with a real‑world analogy, details HTTP redirection, compares grant types, and provides a complete Spring Boot implementation of an authorization server, client application, and role‑based access control for microservices.

AuthenticationAuthorizationSSO
0 likes · 12 min read
Understanding OAuth2 Single Sign-On (SSO) and Its Spring Boot Implementation
Programmer DD
Programmer DD
Oct 25, 2021 · Information Security

How to Implement Single Sign‑On with Spring Security and JWT in 30 Minutes

This tutorial walks through the concepts of Single Sign‑On (SSO) and JSON Web Tokens (JWT), then provides a complete Spring Security integration with JWT—including project structure, RSA key handling, utility classes, custom authentication and verification filters, and step‑by‑step testing using Postman.

JWTJavaSSO
0 likes · 19 min read
How to Implement Single Sign‑On with Spring Security and JWT in 30 Minutes
Java High-Performance Architecture
Java High-Performance Architecture
Sep 29, 2021 · Information Security

How Authelia Enables Open‑Source Two‑Factor SSO for Your Apps

This article introduces Authelia, an open‑source authentication and authorization server that provides two‑factor authentication and single sign‑on, explains how it integrates with reverse proxies like Nginx, Traefik or HAProxy, outlines installation options, showcases its UI and key security features, and shares its GitHub statistics and link.

AutheliaSSOSecurity
0 likes · 4 min read
How Authelia Enables Open‑Source Two‑Factor SSO for Your Apps
GrowingIO Tech Team
GrowingIO Tech Team
Sep 16, 2021 · Information Security

How GrowingIO Unified OAuth2, LDAP, and CAS for Seamless SSO Integration

GrowingIO’s server-side solution integrates three distinct authentication protocols—OAuth2, LDAP, and CAS—into a unified SSO flow, detailing each protocol’s process, the overall architecture, role of the IAM and Gateway components, and providing configuration and code examples for implementation.

AuthenticationCASLDAP
0 likes · 12 min read
How GrowingIO Unified OAuth2, LDAP, and CAS for Seamless SSO Integration
WeDoctor Frontend Technology
WeDoctor Frontend Technology
Sep 1, 2021 · Backend Development

From Cookies to JWT: Mastering Web Session and SSO Strategies

This article explains the evolution from basic web cookies to session management, explores domain sharing, details cookie‑session architecture, introduces single sign‑on methods, and compares the traditional session approach with JWT token authentication, highlighting their advantages, limitations, and implementation considerations.

BackendJWTSSO
0 likes · 16 min read
From Cookies to JWT: Mastering Web Session and SSO Strategies
IT Architects Alliance
IT Architects Alliance
Aug 25, 2021 · Information Security

Understanding Single Sign-On (SSO) Mechanism and Java Implementation

This article explains the stateless nature of HTTP, the session and cookie mechanisms for single‑system login, the challenges of multi‑system environments, and provides a detailed overview of Single Sign‑On (SSO) concepts, token flow, and step‑by‑step Java code examples for client and server implementations.

AuthenticationJavaSSO
0 likes · 14 min read
Understanding Single Sign-On (SSO) Mechanism and Java Implementation
21CTO
21CTO
Aug 19, 2021 · Information Security

Comparing Top SaaS Identity Management Solutions: Okta, Auth0, and Frontegg

This article reviews three leading SaaS user‑management platforms—Okta, Auth0, and Frontegg—detailing their features, advantages, pricing, and differences in multi‑tenant support, social login, and plug‑in capabilities to help developers choose the best solution for their applications.

AuthenticationIdentity ManagementSSO
0 likes · 8 min read
Comparing Top SaaS Identity Management Solutions: Okta, Auth0, and Frontegg
Code Ape Tech Column
Code Ape Tech Column
Jul 23, 2021 · Information Security

Mastering OAuth2 SSO with SpringBoot: A Step‑by‑Step Guide

This article explains the principles of Single Sign‑On using OAuth2.0, illustrates the flow with a real‑world analogy, and provides a complete SpringBoot implementation for both the authorization server and client, including role‑based permission control and microservice integration.

AuthenticationAuthorizationMicroservices
0 likes · 11 min read
Mastering OAuth2 SSO with SpringBoot: A Step‑by‑Step Guide
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Jul 22, 2021 · Information Security

Mastering CAS-Based Single Sign-On: From Session Mechanics to Seamless Logout

This article explains a complete CAS-based single sign‑on solution, covering traditional session mechanisms, the CAS architecture, implementation of single sign‑on, session renewal, single logout, and practical extensions for multi‑system integration to ensure secure and seamless user experiences across enterprise applications.

AuthenticationCASSSO
0 likes · 12 min read
Mastering CAS-Based Single Sign-On: From Session Mechanics to Seamless Logout