Tag

token authentication

1 views collected around this technical thread.

Top Architecture Tech Stack
Top Architecture Tech Stack
Jun 3, 2025 · Backend Development

Token Transmission and Internal Service Call Strategies in Spring Boot Microservices

The article discusses why token transmission is discouraged in microservice authentication, proposes passing explicit parameters, compares Feign, Dubbo, and Spring Boot Web internal call approaches, and explains how to integrate these patterns with a unified gateway, regular authentication modules, and Kubernetes Ingress for scalable backend architectures.

DubboKubernetesSpring Boot
0 likes · 8 min read
Token Transmission and Internal Service Call Strategies in Spring Boot Microservices
Top Architect
Top Architect
May 23, 2025 · Backend Development

Secure File Upload and Preview with Spring Boot, Minio, and KKFile

This article demonstrates how to securely upload files to Minio, stream them for preview via KKFile without exposing the Minio endpoint, and protect download URLs with token validation, providing complete Java code examples for upload, download, and preview URL generation.

File UploadJavaMinIO
0 likes · 10 min read
Secure File Upload and Preview with Spring Boot, Minio, and KKFile
Code Ape Tech Column
Code Ape Tech Column
Mar 23, 2025 · Information Security

Understanding QR Code Login: Principles, Token Authentication, and Process Flow

This article explains the fundamentals of QR code login, covering QR code basics, token‑based authentication, the step‑by‑step process from QR generation to device polling, scanning, confirmation, and token exchange, and discusses security considerations and implementation details for web, PC, and mobile platforms.

QR codeWeb Securitylogin
0 likes · 11 min read
Understanding QR Code Login: Principles, Token Authentication, and Process Flow
Top Architect
Top Architect
Nov 19, 2024 · Backend Development

Secure File Upload, Download, and Preview with Spring Boot, MinIO, and kkfile

This article explains how to securely upload files to MinIO, generate token‑protected download links, and create kkfile preview URLs using Spring Boot, while avoiding exposure of the MinIO address and adding token authentication for enhanced security.

BackendFile UploadMinIO
0 likes · 9 min read
Secure File Upload, Download, and Preview with Spring Boot, MinIO, and kkfile
Lobster Programming
Lobster Programming
Oct 23, 2024 · Backend Development

How to Enforce Single-Device Login with Session, Token, and JWT

This article explains three backend strategies—session‑cookie, token, and JWT—to ensure an account can only be active on one device at a time, detailing the workflow, data structures, and Redis integration needed to implement forced logout across multiple endpoints.

JWTRedisSession Management
0 likes · 6 min read
How to Enforce Single-Device Login with Session, Token, and JWT
Java Tech Enthusiast
Java Tech Enthusiast
Aug 8, 2024 · Information Security

Token Authentication Strategies for Java Microservices

The article compares token‑based authentication options for Java microservices—stateless JWTs, OAuth 2.0 with access and refresh tokens, a centralized API‑gateway authority, and internal service‑to‑service schemes—guiding readers on selecting the best approach according to security, scalability, and business needs.

API GatewayJWTJava
0 likes · 7 min read
Token Authentication Strategies for Java Microservices
macrozheng
macrozheng
May 7, 2024 · Information Security

10 Proven Strategies to Secure Your API Data

Ensuring API data security involves encrypting transmission, using signatures, token authentication, timestamps, nonces, rate limiting, black/white lists, data masking, and parameter validation, with detailed explanations of symmetric/asymmetric encryption, HTTPS, RSA, MD5, and practical implementation steps for robust protection.

API securityEncryptionRate Limiting
0 likes · 13 min read
10 Proven Strategies to Secure Your API Data
Java Tech Enthusiast
Java Tech Enthusiast
Apr 2, 2024 · Cloud Native

Token Transmission and Internal Service Calls in Spring Cloud Microservices

Instead of forwarding JWTs through every microservice, the gateway should validate the token, extract the userId and send it as a header, keeping internal services stateless, while developers can choose among Feign, Dubbo, or combined Spring‑Boot/Dubbo patterns, optionally using a shared auth module and Kubernetes ingress for discovery, as the optimal architecture depends on project needs.

API GatewayKubernetesSpring Cloud
0 likes · 7 min read
Token Transmission and Internal Service Calls in Spring Cloud Microservices
Architect's Guide
Architect's Guide
Mar 23, 2024 · Backend Development

Best Practices for Internal Service Calls and Token Handling in Microservices

The article compares several microservice internal‑call strategies—including token‑pass-through, Feign, Dubbo, Spring Boot Web with Dubbo, and K8s‑integrated approaches—explaining their advantages, drawbacks, and how to implement unified authentication while keeping APIs stateless and reusable.

DubboKubernetesSpring Boot
0 likes · 8 min read
Best Practices for Internal Service Calls and Token Handling in Microservices
Code Ape Tech Column
Code Ape Tech Column
Jul 7, 2023 · Backend Development

Integrating Redis with Spring Security OAuth2 for Distributed Unified Authentication in the Code Ape Chronic Disease Cloud Management System

This article explains how to replace JWT with a Redis‑backed Spring Security OAuth2 solution, detailing token storage, client types (WEB, PDA, PAD, patient app, mini‑program), password‑mode login requests, encryption of credentials, gateway filters, authentication converters, providers, token generation, persistence in Redis, and success handling, all illustrated with code snippets and diagrams.

OAuth2RedisSpring Security
0 likes · 19 min read
Integrating Redis with Spring Security OAuth2 for Distributed Unified Authentication in the Code Ape Chronic Disease Cloud Management System
Efficient Ops
Efficient Ops
Feb 8, 2023 · Information Security

Why Sessions Burden Servers and How Token‑Based Authentication Solves It

This article traces the evolution from simple web page browsing to modern token‑based authentication, explaining the scalability and security problems of server‑side sessions and showing how signed, stateless tokens using HMAC‑SHA256 eliminate those issues while supporting horizontal scaling and cross‑platform access.

HMACSession ManagementStateless
0 likes · 13 min read
Why Sessions Burden Servers and How Token‑Based Authentication Solves It
Selected Java Interview Questions
Selected Java Interview Questions
Dec 12, 2022 · Information Security

Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT

This article explains the terminology, background, goals, technical choices, workflow, and API design of a token‑based authentication solution that leverages OAuth2 password grant and JWT to provide secure, stateless, cross‑platform access for enterprise applications.

JWTOAuth2backend development
0 likes · 10 min read
Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT
Architecture Digest
Architecture Digest
Nov 25, 2022 · Information Security

Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT

The article explains why enterprises need a unified account management system, defines key authentication terms, outlines the advantages of token‑based security, describes a complete OAuth2 password‑grant flow with JWT, and presents the technical choices and interface designs for implementing a robust, cross‑service authentication solution.

Identity ManagementJWTOAuth2
0 likes · 10 min read
Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT
Top Architect
Top Architect
Nov 19, 2022 · Backend Development

Design and Implementation of an Open API Token Authentication System with Spring Boot

This article explains how to design an open API authentication mechanism by creating app credentials, storing them in a MySQL table, generating short‑lived access tokens with a utility class, exposing a token endpoint, and securing all /openApi/* routes with a Spring interceptor, complete with code examples.

API designBackendJava
0 likes · 9 min read
Design and Implementation of an Open API Token Authentication System with Spring Boot
Laravel Tech Community
Laravel Tech Community
Jun 29, 2022 · Information Security

Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT

This article describes the challenges of fragmented user management in enterprise applications and presents a unified, standardized account management solution based on token authentication, detailing OAuth2 password flow, JWT usage, system architecture, authorization processes, credential renewal, and interface design for secure, scalable access control.

Enterprise SecurityJWTOAuth2
0 likes · 7 min read
Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT
Top Architect
Top Architect
Jun 29, 2022 · Information Security

Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT

This article explains the need for a unified account management platform in enterprises, defines key authentication terms, compares session‑based and token‑based approaches, outlines a complete OAuth2 password‑grant flow with JWT tokens, and discusses technical choices, security features, and interface design for modern microservice architectures.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT
IT Architects Alliance
IT Architects Alliance
May 24, 2022 · Information Security

Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT

This document explains the need for a unified account management system in enterprise cloud platforms, defines key terminology, outlines the advantages of token‑based authentication, describes the OAuth2 password‑grant flow and JWT usage, and details the technical design, interface specifications, and credential renewal process for secure cross‑service access.

JWTOAuth2access control
0 likes · 9 min read
Design and Implementation of Token‑Based Authentication Using OAuth2 and JWT
Top Architect
Top Architect
May 23, 2022 · Information Security

Designing a Unified Token‑Based Authentication System Using OAuth2 and JWT

The article explains how to design a unified, token‑based authentication system for enterprise applications, covering OAuth2 password grant, JWT usage, token issuance, validation, renewal processes, and interface design, while highlighting the benefits of stateless security and cross‑service single sign‑on.

JWTOAuth2access control
0 likes · 10 min read
Designing a Unified Token‑Based Authentication System Using OAuth2 and JWT
Top Architect
Top Architect
Mar 26, 2022 · Information Security

Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview

This article explains the necessity of a unified account management system for enterprise applications, defines key authentication terms, outlines the background and goals of token-based security, details the OAuth2 password‑grant flow with JWT, and discusses technical choices, interface design, and token renewal processes.

BackendJWTOAuth2
0 likes · 9 min read
Token-Based Authentication Architecture and OAuth2/JWT Implementation Overview
IT Architects Alliance
IT Architects Alliance
Mar 21, 2022 · Information Security

OAuth2 and JWT Based Security Authentication Design and Implementation Overview

This article provides a comprehensive overview of a token‑based security authentication system, covering terminology, development background, objectives, functional points, technology selection, OAuth2 grant types, JWT fundamentals, authentication flow, credential renewal, and interface design for unified access control across microservices.

JWTOAuth2access token
0 likes · 10 min read
OAuth2 and JWT Based Security Authentication Design and Implementation Overview