Tagged articles
14 articles
Page 1 of 1
macrozheng
macrozheng
Apr 25, 2026 · Backend Development

A 3‑Year‑Proven Universal Multi‑Account Login Architecture

The article details a comprehensive multi‑account unified login design—including phone‑number registration, optional password login, third‑party integrations, a split user‑basic and user‑auth data model, its pros and cons, and a one‑click mobile number authentication flow—offering practical insights from three years of production use.

AuthenticationDatabase designlogin
0 likes · 14 min read
A 3‑Year‑Proven Universal Multi‑Account Login Architecture
大转转FE
大转转FE
Aug 23, 2024 · Information Security

How OAuth2.0 Powers Third‑Party Login: From WeChat to Secure Token Flows

This article explains third‑party authorization login, using WeChat as a concrete example, and provides a detailed walkthrough of the OAuth2.0 protocol, its roles, grant types, token handling, and implementation steps for mobile and web applications.

Authorization CodeOAuth2.0Security
0 likes · 24 min read
How OAuth2.0 Powers Third‑Party Login: From WeChat to Secure Token Flows
Architect's Guide
Architect's Guide
Jul 28, 2023 · Information Security

OAuth 2.0 Overview, Authorization Modes, and Implementation for GitHub, QQ, and WeChat Login

This article provides a comprehensive introduction to OAuth 2.0, its core concepts, advantages and disadvantages, details four authorization flows, and presents step‑by‑step Java Spring Boot implementations for GitHub, QQ, and WeChat third‑party login, including database design considerations and code examples.

AuthenticationGitHubJava
0 likes · 21 min read
OAuth 2.0 Overview, Authorization Modes, and Implementation for GitHub, QQ, and WeChat Login
Selected Java Interview Questions
Selected Java Interview Questions
Jul 10, 2023 · Backend Development

Designing a Unified Multi‑Account Login System with Phone, Password, and Third‑Party Authentication

This article outlines a comprehensive approach to building a scalable multi‑account login system that supports phone‑number/password, phone‑number/verification‑code, and various third‑party OAuth providers, detailing workflow steps, database schema, advantages, drawbacks, and a one‑click login integration.

AuthenticationBackendaccount‑design
0 likes · 15 min read
Designing a Unified Multi‑Account Login System with Phone, Password, and Third‑Party Authentication
Java Tech Enthusiast
Java Tech Enthusiast
Oct 21, 2022 · Backend Development

Implementing Third-Party OAuth2 Login with Gitee in Spring Boot

The article walks through registering a Gitee OAuth2 application, building a Spring Boot project with a login page, implementing a controller that exchanges the authorization code for an access token, retrieves user information, and displays the authenticated user's name and avatar on a success page.

GiteeJavaOAuth2
0 likes · 9 min read
Implementing Third-Party OAuth2 Login with Gitee in Spring Boot
Programmer DD
Programmer DD
Sep 18, 2021 · Backend Development

Simplify Social Logins with JustAuth: A Complete Java Integration Guide

This article introduces JustAuth, a lightweight open‑source Java library that streamlines third‑party social logins by supporting dozens of platforms, explains its benefits for users and developers, and provides step‑by‑step Maven setup, HTTP client selection, and code examples for basic, builder‑pattern, and custom authentication flows.

Backend DevelopmentJavaJustAuth
0 likes · 6 min read
Simplify Social Logins with JustAuth: A Complete Java Integration Guide
Laravel Tech Community
Laravel Tech Community
Sep 8, 2020 · Backend Development

Unified Multi-Account Login: Architecture, Flow, and Database Design

This article explains the technical solutions for unified multi‑account login in web applications, covering early‑stage username/password and mobile verification flows, detailed process steps, OAuth2.0 third‑party integration, and comprehensive database schema design for local and third‑party user authentication.

AuthenticationBackendDatabase design
0 likes · 8 min read
Unified Multi-Account Login: Architecture, Flow, and Database Design
Architect
Architect
Jul 18, 2020 · Information Security

Understanding OAuth 2.0: Scenarios, Flow, and Implementation Details

This article explains the concept of OAuth, its typical use cases such as third‑party login, the roles of user, service provider, and platform, and provides a step‑by‑step flow with code examples for obtaining authorization codes, access tokens, and user information.

OAuthWeb Developmentaccess_token
0 likes · 11 min read
Understanding OAuth 2.0: Scenarios, Flow, and Implementation Details
Liangxu Linux
Liangxu Linux
Jun 11, 2020 · Backend Development

How to Build a Unified Multi‑Account Login System with Third‑Party OAuth

This article explains the technical design of a unified multi‑account login system, covering early‑stage username/password and phone‑based authentication, detailed flow steps, database schema, and integration of third‑party OAuth (e.g., QQ) while highlighting practical considerations and limitations.

AuthenticationOAuth2database-design
0 likes · 10 min read
How to Build a Unified Multi‑Account Login System with Third‑Party OAuth
360 Quality & Efficiency
360 Quality & Efficiency
Aug 15, 2019 · Information Security

Understanding the OAuth Authorization Flow Using a WeChat Login Example

This article explains the OAuth authorization process, illustrating how a third‑party app like a WeChat‑based login requests user permission, obtains a code, exchanges it for an access token, and uses that token to access user data, while highlighting token expiration and business‑scenario applications.

AuthorizationOAuthWeChat
0 likes · 4 min read
Understanding the OAuth Authorization Flow Using a WeChat Login Example
Java Captain
Java Captain
Jul 23, 2019 · Backend Development

Design and Implementation of a Multi‑Account Login System with Third‑Party Integration

This article explains the technical solutions, workflow diagrams, and database schema for building a multi‑account login system that supports username/password, phone‑number, and third‑party (e.g., QQ, WeChat) authentication, while outlining security measures such as password hashing, login throttling, and token management.

BackendDatabase designOAuth2
0 likes · 10 min read
Design and Implementation of a Multi‑Account Login System with Third‑Party Integration
21CTO
21CTO
Feb 27, 2016 · Information Security

How Attackers Exploit Sina Weibo OAuth to Hijack User Accounts

This article examines common security pitfalls when integrating Sina Weibo OAuth for user login and account binding, illustrating CSRF vulnerabilities and code‑theft attacks through real‑world examples on Bilibili, NetEase Cloud Music, and Zhihu, and offers mitigation recommendations.

CSRFOAuth2Security Vulnerability
0 likes · 10 min read
How Attackers Exploit Sina Weibo OAuth to Hijack User Accounts