Tag

Token Management

1 views collected around this technical thread.

Test Development Learning Exchange
Test Development Learning Exchange
Oct 1, 2024 · Fundamentals

Using Pytest Fixtures to Manage API Tokens in Test Automation

This article explains how to define token retrieval methods as pytest fixtures to reuse authentication tokens across multiple test cases, ensuring fresh tokens for each test and demonstrating fixture scope, cleanup, and global usage patterns.

API testingAuthenticationTest Automation
0 likes · 6 min read
Using Pytest Fixtures to Manage API Tokens in Test Automation
JD Retail Technology
JD Retail Technology
Dec 13, 2023 · Artificial Intelligence

Integrating ChatGPT with the Columbus Instant Design Platform: Capabilities, Demonstrations, and Implementation Principles

This article explains how ChatGPT is integrated into the Columbus Instant Design low‑code platform, detailing the platform’s core capabilities, AI‑driven workflow for creating and modifying UI floors, implementation architecture, token management, and future development plans.

AI integrationChatGPTDSL
0 likes · 7 min read
Integrating ChatGPT with the Columbus Instant Design Platform: Capabilities, Demonstrations, and Implementation Principles
Selected Java Interview Questions
Selected Java Interview Questions
Nov 23, 2023 · Backend Development

Common Issues and Solutions When Integrating Third‑Party APIs

This article outlines typical problems such as unreachable domains, signature errors, token expiration, timeouts, HTTP 500/404 responses, pagination inconsistencies, undocumented field changes, and billing issues, and provides practical troubleshooting and mitigation strategies for backend developers working with third‑party APIs.

API IntegrationSignatureToken Management
0 likes · 15 min read
Common Issues and Solutions When Integrating Third‑Party APIs
Test Development Learning Exchange
Test Development Learning Exchange
Jun 11, 2023 · Backend Development

Five Ways to Store Tokens in API Automated Testing with Python Examples

This article explains five common methods for storing authentication tokens during API automated testing—embedding in scripts, using environment variables, configuration files, databases, and secret management systems—and provides complete Python code samples for each approach.

API testingPythonToken Management
0 likes · 6 min read
Five Ways to Store Tokens in API Automated Testing with Python Examples
Sanyou's Java Diary
Sanyou's Java Diary
May 15, 2023 · Information Security

Master OAuth2: From Theory to Hands‑On Implementation with Spring Security

This article explains OAuth2 fundamentals, key terminology, and authorization flows, then guides you through setting up database tables, Spring Boot dependencies, resource and authorization server configurations, multiple grant types, token refresh, permission checks, and common pitfalls, providing complete code snippets and diagrams for a practical implementation.

AuthenticationAuthorization Code FlowJava
0 likes · 17 min read
Master OAuth2: From Theory to Hands‑On Implementation with Spring Security
IT Services Circle
IT Services Circle
May 9, 2023 · Backend Development

Common Issues and Solutions When Integrating Third-Party APIs

This article outlines typical problems such as domain inaccessibility, signature errors, token expiration, timeouts, HTTP 500/404 responses, inconsistent documentation, and provides practical debugging and mitigation strategies for developers working with third‑party API integrations.

API IntegrationSignatureToken Management
0 likes · 15 min read
Common Issues and Solutions When Integrating Third-Party APIs
vivo Internet Technology
vivo Internet Technology
Mar 3, 2021 · Backend Development

Design and Implementation of a Hundred-Million-Level User Center System

The article outlines a microservice‑based user‑center architecture for handling over one hundred million users, detailing gateway, core, and async services, interface design, vertical and horizontal database sharding, token graceful degradation, multi‑layer password security, event‑driven async processing, and comprehensive monitoring for high availability, performance, and security.

Data SecurityHigh AvailabilityToken Management
0 likes · 14 min read
Design and Implementation of a Hundred-Million-Level User Center System
Java Architecture Diary
Java Architecture Diary
Sep 20, 2019 · Information Security

How to Ensure Consistent OAuth2 Tokens Across Multiple Clients with Custom Key Generation

This article explains how to achieve consistent OAuth2 token handling across multiple clients and tenants by customizing the token key generation, overriding DefaultTokenServices logic, and configuring a RedisTokenStore with a custom AuthenticationKeyGenerator in a Spring Boot application.

JavaOAuth2Redis
0 likes · 5 min read
How to Ensure Consistent OAuth2 Tokens Across Multiple Clients with Custom Key Generation
Tencent Cloud Developer
Tencent Cloud Developer
Feb 20, 2019 · Cloud Computing

WePY and Cloud Development: Practical Guide and Best Practices

The guide explains how to combine WePY’s Vue‑style component model with Tencent Cloud Development—showing project initialization, cloud‑function setup, common pitfalls, and a token‑caching example—so developers can build and launch a full mini‑program in roughly 24 hours while competing for best‑practice prizes.

JavaScriptTencent CloudToken Management
0 likes · 9 min read
WePY and Cloud Development: Practical Guide and Best Practices
Hujiang Technology
Hujiang Technology
Aug 30, 2017 · Information Security

Design Principles and Security Considerations for User Account Systems

This article shares practical insights on building robust user account systems, covering the shift from usernames to phone numbers as unique identifiers, the drawbacks of passwords, the limited value of periodic password changes, the pitfalls of security questions, and best practices for token management, SMS/voice verification, captcha usage, and multi‑layered future security strategies.

AuthenticationSMS verificationToken Management
0 likes · 14 min read
Design Principles and Security Considerations for User Account Systems