Tagged articles
52 articles
Page 1 of 1
Architect's Must-Have
Architect's Must-Have
Jun 6, 2025 · Backend Development

How to Secure API Calls with Tokens, Timestamps, and Signatures in Spring Boot

This article explains practical methods for protecting data exchanged with third‑party systems by using access tokens, timestamps, cryptographic signatures, and anti‑duplicate‑submission techniques, and provides complete Spring Boot code examples for token generation, validation, Redis storage, and request interception.

API SecuritySpring Bootbackend-development
0 likes · 24 min read
How to Secure API Calls with Tokens, Timestamps, and Signatures in Spring Boot
Top Architecture Tech Stack
Top Architecture Tech Stack
Jun 3, 2025 · Backend Development

Token Transmission and Internal Service Call Strategies in Spring Boot Microservices

The article discusses why token transmission is discouraged in microservice authentication, proposes passing explicit parameters, compares Feign, Dubbo, and Spring Boot Web internal call approaches, and explains how to integrate these patterns with a unified gateway, regular authentication modules, and Kubernetes Ingress for scalable backend architectures.

DubboKubernetesMicroservices
0 likes · 8 min read
Token Transmission and Internal Service Call Strategies in Spring Boot Microservices
Top Architect
Top Architect
May 23, 2025 · Backend Development

Secure File Upload and Preview with Spring Boot, Minio, and KKFile

This article demonstrates how to securely upload files to Minio, stream them for preview via KKFile without exposing the Minio endpoint, and protect download URLs with token validation, providing complete Java code examples for upload, download, and preview URL generation.

MinioSpring Bootfile upload
0 likes · 10 min read
Secure File Upload and Preview with Spring Boot, Minio, and KKFile
Code Ape Tech Column
Code Ape Tech Column
Mar 23, 2025 · Information Security

Understanding QR Code Login: Principles, Token Authentication, and Process Flow

This article explains the fundamentals of QR code login, covering QR code basics, token‑based authentication, the step‑by‑step process from QR generation to device polling, scanning, confirmation, and token exchange, and discusses security considerations and implementation details for web, PC, and mobile platforms.

MobileQR codeWeb Security
0 likes · 11 min read
Understanding QR Code Login: Principles, Token Authentication, and Process Flow
Lobster Programming
Lobster Programming
Oct 23, 2024 · Backend Development

How to Enforce Single-Device Login with Session, Token, and JWT

This article explains three backend strategies—session‑cookie, token, and JWT—to ensure an account can only be active on one device at a time, detailing the workflow, data structures, and Redis integration needed to implement forced logout across multiple endpoints.

JWTSession ManagementSingle Sign-On
0 likes · 6 min read
How to Enforce Single-Device Login with Session, Token, and JWT
Java Tech Enthusiast
Java Tech Enthusiast
Aug 8, 2024 · Information Security

Token Authentication Strategies for Java Microservices

The article compares token‑based authentication options for Java microservices—stateless JWTs, OAuth 2.0 with access and refresh tokens, a centralized API‑gateway authority, and internal service‑to‑service schemes—guiding readers on selecting the best approach according to security, scalability, and business needs.

JWTOAuth2api-gateway
0 likes · 7 min read
Token Authentication Strategies for Java Microservices
macrozheng
macrozheng
May 7, 2024 · Information Security

10 Proven Strategies to Secure Your API Data

Ensuring API data security involves encrypting transmission, using signatures, token authentication, timestamps, nonces, rate limiting, black/white lists, data masking, and parameter validation, with detailed explanations of symmetric/asymmetric encryption, HTTPS, RSA, MD5, and practical implementation steps for robust protection.

API Securityencryptionrate limiting
0 likes · 13 min read
10 Proven Strategies to Secure Your API Data
Java Tech Enthusiast
Java Tech Enthusiast
Apr 2, 2024 · Cloud Native

Token Transmission and Internal Service Calls in Spring Cloud Microservices

Instead of forwarding JWTs through every microservice, the gateway should validate the token, extract the userId and send it as a header, keeping internal services stateless, while developers can choose among Feign, Dubbo, or combined Spring‑Boot/Dubbo patterns, optionally using a shared auth module and Kubernetes ingress for discovery, as the optimal architecture depends on project needs.

KubernetesMicroservicesSpring Cloud
0 likes · 7 min read
Token Transmission and Internal Service Calls in Spring Cloud Microservices
Architect's Guide
Architect's Guide
Mar 23, 2024 · Backend Development

Best Practices for Internal Service Calls and Token Handling in Microservices

The article compares several microservice internal‑call strategies—including token‑pass-through, Feign, Dubbo, Spring Boot Web with Dubbo, and K8s‑integrated approaches—explaining their advantages, drawbacks, and how to implement unified authentication while keeping APIs stateless and reusable.

DubboKubernetesMicroservices
0 likes · 8 min read
Best Practices for Internal Service Calls and Token Handling in Microservices
Code Ape Tech Column
Code Ape Tech Column
Jul 7, 2023 · Backend Development

Integrating Redis with Spring Security OAuth2 for Distributed Unified Authentication in the Code Ape Chronic Disease Cloud Management System

This article explains how to replace JWT with a Redis‑backed Spring Security OAuth2 solution, detailing token storage, client types (WEB, PDA, PAD, patient app, mini‑program), password‑mode login requests, encryption of credentials, gateway filters, authentication converters, providers, token generation, persistence in Redis, and success handling, all illustrated with code snippets and diagrams.

OAuth2backend-developmentspring-security
0 likes · 19 min read
Integrating Redis with Spring Security OAuth2 for Distributed Unified Authentication in the Code Ape Chronic Disease Cloud Management System
Programmer DD
Programmer DD
Apr 24, 2023 · Information Security

Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works

This article explains the concepts, workflows, and key differences between Single Sign‑On (SSO) and OAuth2.0, illustrating how token‑based authentication replaces passwords, detailing typical CAS‑based SSO steps, OAuth2.0 authorization‑code flow, and clarifying related terminology and grant types.

AuthorizationCASOAuth2.0
0 likes · 9 min read
Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works
Efficient Ops
Efficient Ops
Feb 8, 2023 · Information Security

Why Sessions Burden Servers and How Token‑Based Authentication Solves It

This article traces the evolution from simple web page browsing to modern token‑based authentication, explaining the scalability and security problems of server‑side sessions and showing how signed, stateless tokens using HMAC‑SHA256 eliminate those issues while supporting horizontal scaling and cross‑platform access.

HMACSession ManagementWeb Security
0 likes · 13 min read
Why Sessions Burden Servers and How Token‑Based Authentication Solves It
Java High-Performance Architecture
Java High-Performance Architecture
Dec 8, 2022 · Information Security

Unlocking Secure Unified Account Management with Token‑Based OAuth2

This article explains why enterprises need a standardized account management system, outlines the advantages of token‑based authentication over session‑based approaches, and details the OAuth2 and JWT design, workflow, and technical choices for building a scalable, secure, cross‑service authentication solution.

Account ManagementJWTMicroservices
0 likes · 10 min read
Unlocking Secure Unified Account Management with Token‑Based OAuth2
Architecture Digest
Architecture Digest
Nov 25, 2022 · Information Security

Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT

The article explains why enterprises need a unified account management system, defines key authentication terms, outlines the advantages of token‑based security, describes a complete OAuth2 password‑grant flow with JWT, and presents the technical choices and interface designs for implementing a robust, cross‑service authentication solution.

Identity ManagementJWTOAuth2
0 likes · 10 min read
Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT
Top Architect
Top Architect
Nov 19, 2022 · Backend Development

Design and Implementation of an Open API Token Authentication System with Spring Boot

This article explains how to design an open API authentication mechanism by creating app credentials, storing them in a MySQL table, generating short‑lived access tokens with a utility class, exposing a token endpoint, and securing all /openApi/* routes with a Spring interceptor, complete with code examples.

Spring Bootapi-designjava
0 likes · 9 min read
Design and Implementation of an Open API Token Authentication System with Spring Boot
Liangxu Linux
Liangxu Linux
Aug 28, 2022 · Information Security

10 Proven Strategies to Secure API Data: Encryption, Signing, Tokens & More

This article outlines ten practical methods to secure API data, covering encryption of transmission, digital signing, token authentication, timestamp and nonce replay protection, rate limiting, blacklist/whitelist controls, data masking, and parameter validation, with detailed explanations and implementation steps.

API SecurityParameter Validationdata masking
0 likes · 13 min read
10 Proven Strategies to Secure API Data: Encryption, Signing, Tokens & More
ITPUB
ITPUB
Jul 4, 2022 · Information Security

10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More

This article outlines ten practical methods for protecting API data, covering transmission encryption, digital signatures, token authentication, timestamp and nonce mechanisms, rate limiting, blacklist/whitelist controls, data masking, and parameter validation to ensure comprehensive interface security.

API SecurityParameter Validationdata masking
0 likes · 14 min read
10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More
Laravel Tech Community
Laravel Tech Community
Jun 29, 2022 · Information Security

Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT

This article describes the challenges of fragmented user management in enterprise applications and presents a unified, standardized account management solution based on token authentication, detailing OAuth2 password flow, JWT usage, system architecture, authorization processes, credential renewal, and interface design for secure, scalable access control.

JWTOAuth2access control
0 likes · 7 min read
Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT
Top Architect
Top Architect
Jun 29, 2022 · Information Security

Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT

This article explains the need for a unified account management platform in enterprises, defines key authentication terms, compares session‑based and token‑based approaches, outlines a complete OAuth2 password‑grant flow with JWT tokens, and discusses technical choices, security features, and interface design for modern microservice architectures.

Information SecurityJWTOAuth2
0 likes · 8 min read
Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT
IT Architects Alliance
IT Architects Alliance
May 24, 2022 · Information Security

Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT

This document explains the need for a unified account management system in enterprise cloud platforms, defines key terminology, outlines the advantages of token‑based authentication, describes the OAuth2 password‑grant flow and JWT usage, and details the technical design, interface specifications, and credential renewal process for secure cross‑service access.

JWTOAuth2access control
0 likes · 9 min read
Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT
Top Architect
Top Architect
May 23, 2022 · Information Security

Designing a Unified Token‑Based Authentication System Using OAuth2 and JWT

The article explains how to design a unified, token‑based authentication system for enterprise applications, covering OAuth2 password grant, JWT usage, token issuance, validation, renewal processes, and interface design, while highlighting the benefits of stateless security and cross‑service single sign‑on.

JWTOAuth2Security Architecture
0 likes · 10 min read
Designing a Unified Token‑Based Authentication System Using OAuth2 and JWT
Top Architect
Top Architect
Mar 26, 2022 · Information Security

Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview

This article explains the necessity of a unified account management system for enterprise applications, defines key authentication terms, outlines the background and goals of token-based security, details the OAuth2 password‑grant flow with JWT, and discusses technical choices, interface design, and token renewal processes.

JWTMicroservicesOAuth2
0 likes · 9 min read
Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview
IT Architects Alliance
IT Architects Alliance
Mar 21, 2022 · Information Security

OAuth2 and JWT Based Security Authentication Design and Implementation Overview

This article provides a comprehensive overview of a token‑based security authentication system, covering terminology, development background, objectives, functional points, technology selection, OAuth2 grant types, JWT fundamentals, authentication flow, credential renewal, and interface design for unified access control across microservices.

Information SecurityJWTOAuth2
0 likes · 10 min read
OAuth2 and JWT Based Security Authentication Design and Implementation Overview
Architecture Digest
Architecture Digest
Mar 14, 2022 · Information Security

Standardized Token‑Based Authentication Architecture Using OAuth2 and JWT for Enterprise Platforms

The article outlines the need for a unified account management system in enterprise platforms and details a token‑based authentication solution using OAuth2 password grant and JWT, describing its advantages, workflow, technical selection, and interface design for secure cross‑service integration.

Information SecurityJWTOAuth2
0 likes · 9 min read
Standardized Token‑Based Authentication Architecture Using OAuth2 and JWT for Enterprise Platforms
IT Architects Alliance
IT Architects Alliance
Mar 3, 2022 · Information Security

Design and Implementation of a Token-Based Unified Authentication System Using OAuth2 and JWT

This article outlines the design rationale, objectives, and technical choices for a unified, token‑based authentication system based on OAuth2 password grant and JWT, detailing terminology, workflow steps, security benefits, and interface specifications to enable cross‑system single sign‑on and secure access control.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of a Token-Based Unified Authentication System Using OAuth2 and JWT
21CTO
21CTO
Mar 3, 2022 · Information Security

How Token‑Based OAuth2 Authentication Powers Secure Enterprise Platforms

This article explains why enterprises need a unified, token‑based OAuth2 authentication system, outlines its advantages over session‑based methods, describes the standard OAuth2 password flow, JWT usage, and details the authorization, authentication, and credential‑renewal processes with architectural diagrams.

JWTOAuth2enterprise security
0 likes · 10 min read
How Token‑Based OAuth2 Authentication Powers Secure Enterprise Platforms
Architect
Architect
Mar 3, 2022 · Information Security

Design and Implementation of Token-Based Authentication Using OAuth2 and JWT

This article explains the necessity of a unified account management system for enterprise applications and details a token‑based authentication solution using OAuth2 password grant and JWT, covering definitions, advantages, workflow steps, technical choices, and interface design for secure microservice integration.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of Token-Based Authentication Using OAuth2 and JWT
Programmer DD
Programmer DD
Aug 19, 2021 · Information Security

Why GitHub Dropped Password Authentication and How to Switch to Tokens

GitHub has ended password‑based Git authentication as of August 13 2021, mandating token‑based methods such as personal access tokens, OAuth, or SSH keys, and the article explains the timeline, security reasons, affected workflows, and steps developers must take to avoid disruption.

Developer WorkflowGitHubpassword removal
0 likes · 6 min read
Why GitHub Dropped Password Authentication and How to Switch to Tokens
macrozheng
macrozheng
Jun 9, 2021 · Information Security

Secure API Authentication: Token vs Signature with Java Code

This article compares token-based and signature-based API authentication methods, discusses their advantages and drawbacks, and provides complete Java code examples—including JWT token utilities, authentication interceptors, and signature verification—to help developers implement robust API security in real-world projects.

API SecurityHTTPSJWT
0 likes · 13 min read
Secure API Authentication: Token vs Signature with Java Code
Top Architect
Top Architect
Mar 2, 2021 · Information Security

Designing Secure API Authentication with Token and Signature in Java

This article explains how to secure app open‑API endpoints by using HTTPS, token‑based authentication, timestamp validation, and a URL‑signature algorithm implemented in Java, including detailed steps, interception rules, and sample code for generating and verifying signatures.

API Securitybackend-developmentjava
0 likes · 8 min read
Designing Secure API Authentication with Token and Signature in Java
21CTO
21CTO
Feb 25, 2021 · Information Security

How to Secure Mobile API Calls with Token and Signature Design

This article explains how to secure mobile app open APIs by enforcing HTTPS, designing request signatures with timestamps and tokens, validating them on the server, and managing token‑UID relationships using Redis, complete with Java code examples for parameter extraction and signature generation.

API SecurityHTTPSbackend-development
0 likes · 7 min read
How to Secure Mobile API Calls with Token and Signature Design
Sohu Tech Products
Sohu Tech Products
Jan 20, 2021 · Information Security

Securing Frontend‑Integrated APIs with Token, Timestamp, and Signature Validation in Spring

This article explains how to protect API endpoints that interact with front‑end applications by using token‑based authentication, timestamp checks, and MD5 signatures, detailing the implementation of open and secured controllers, login logic, signature verification, replay‑attack mitigation, and a Spring interceptor.

API SecurityInterceptorReplay attack
0 likes · 9 min read
Securing Frontend‑Integrated APIs with Token, Timestamp, and Signature Validation in Spring
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Nov 29, 2020 · Information Security

Designing a Multi‑Layer Token Authentication System for Secure Multi‑Client Apps

This article examines the classification, security attributes, and hierarchical design of various authentication tokens for multi‑client systems, offering a layered approach that balances usage cost, change cost, and privacy while outlining practical scenarios and implementation principles.

Identity verificationSession Managementaccess_token
0 likes · 16 min read
Designing a Multi‑Layer Token Authentication System for Secure Multi‑Client Apps
Tencent Cloud Middleware
Tencent Cloud Middleware
Sep 23, 2020 · Backend Development

Building a Stable High‑Traffic Microservice System with Consul‑Access and Multi‑Tenant Service Discovery

This article explains how to construct a reliable, high‑throughput microservice platform using open‑source components such as Consul, an access layer, and token‑based multi‑tenant service discovery, covering architecture, registration, heartbeat handling, performance optimizations, high‑availability strategies, graceful shutdown, and deployment best practices.

ConsulKubernetesMicroservices
0 likes · 31 min read
Building a Stable High‑Traffic Microservice System with Consul‑Access and Multi‑Tenant Service Discovery
Top Architect
Top Architect
Jun 22, 2020 · Information Security

Implementing Token-Based Authentication, Anti‑DoS, and Repeat‑Submission Prevention in Spring Boot

This article explains how to design a secure token mechanism with timestamp validation, describes common DoS attack types, and provides practical Spring Boot code examples—including Redis configuration, token generation, interceptor logic, MD5 signing utilities, and ThreadLocal usage—to prevent repeat submissions and protect APIs.

DoS protectionSpring BootThreadLocal
0 likes · 21 min read
Implementing Token-Based Authentication, Anti‑DoS, and Repeat‑Submission Prevention in Spring Boot
Selected Java Interview Questions
Selected Java Interview Questions
Jun 17, 2020 · Information Security

API Security Practices: Tokens, Timestamps, Signatures, and Anti‑Replay Measures with Java Examples

This article explains common API security mechanisms such as token and user token usage, timestamp validation, signature generation, anti‑replay strategies, DoS attack types, and provides Java Spring Boot code examples for token handling, request interception, custom annotations, and ThreadLocal utilities.

API SecurityDoS protectionJava Spring
0 likes · 22 min read
API Security Practices: Tokens, Timestamps, Signatures, and Anti‑Replay Measures with Java Examples
58 Tech
58 Tech
May 13, 2020 · Information Security

Dynamic Signature Strategies for API Security: Attack and Defense Techniques

This article explores the cat‑and‑mouse battle between crawlers and API endpoints, detailing how dynamic signatures, token‑based authentication, time‑bound hashes, rate‑limiting, and code obfuscation can be used to defend against scraping while also showing how attackers can reverse‑engineer and bypass these defenses.

API Securityanti‑crawlingcode obfuscation
0 likes · 12 min read
Dynamic Signature Strategies for API Security: Attack and Defense Techniques
macrozheng
macrozheng
Apr 9, 2020 · Information Security

How QR Code Login Works: Token‑Based Authentication Explained

This article demystifies QR code login by covering what QR codes are, how mobile token‑based authentication works, and the step‑by‑step flow that enables secure PC login via scanning, confirming, and token exchange.

MobileOAuthQR code
0 likes · 8 min read
How QR Code Login Works: Token‑Based Authentication Explained
21CTO
21CTO
Jul 6, 2019 · Information Security

How to Secure Mobile Web Campaign Pages Against Bot Attacks

This article examines the security challenges of mobile web marketing pages, explains how bot-driven API abuse harms users and businesses, and presents a comprehensive solution involving front‑end behavior tracking, risk‑control services, token‑based HTTPS communication, data encryption, and JavaScript obfuscation to protect against automated attacks.

Web Securitydata encryptionhuman verification
0 likes · 16 min read
How to Secure Mobile Web Campaign Pages Against Bot Attacks
21CTO
21CTO
Jun 5, 2019 · Information Security

How to Secure Mobile Web Activity Pages: Human Verification, Tokens, and Code Obfuscation

This article explains the security challenges of mobile web activity pages in e‑commerce, outlines a risk‑control workflow that includes human‑verification algorithms, token‑based communication protection, data encryption, and front‑end code obfuscation, and provides a step‑by‑step technical solution to mitigate abuse and improve user experience.

BackendWeb Securityhuman verification
0 likes · 16 min read
How to Secure Mobile Web Activity Pages: Human Verification, Tokens, and Code Obfuscation
Qunar Tech Salon
Qunar Tech Salon
May 2, 2017 · Information Security

Design and Function of the Internal Application Center for Token‑Based Authentication and Resource Access

The internal Application Center, created in 2013, provides a unified system for naming applications, managing permissions, issuing encrypted tokens, and authenticating app identity to securely control access to configuration data and other resources, replacing fragile IP‑based restrictions with logical app‑based authorization.

Configuration ManagementIdentity verificationapplication center
0 likes · 7 min read
Design and Function of the Internal Application Center for Token‑Based Authentication and Resource Access