Tagged articles
230 articles
Page 2 of 3
Architecture Digest
Architecture Digest
Sep 27, 2023 · Information Security

Understanding JWT Claims and Token Renewal Strategies

This article explains the standard JWT claims, shows how to add custom claims with Java code, and compares single‑token and double‑token renewal approaches, including practical examples such as WeChat web authorization and Redis‑based token storage.

JWTOAuth2Security
0 likes · 6 min read
Understanding JWT Claims and Token Renewal Strategies
Java Interview Crash Guide
Java Interview Crash Guide
Jul 26, 2023 · Backend Development

Ensuring API Idempotency: 4 Proven Strategies with SpringBoot & Redis

This article explains why API idempotency is crucial in real‑world systems, outlines which operations need it, discusses the trade‑offs of adding idempotency, and presents four practical implementation patterns—including unique primary keys, optimistic locking, anti‑duplicate tokens, and downstream sequence numbers—complete with SpringBoot code examples.

APIIdempotencyJava
0 likes · 23 min read
Ensuring API Idempotency: 4 Proven Strategies with SpringBoot & Redis
Laravel Tech Community
Laravel Tech Community
Jun 13, 2023 · Information Security

Understanding Tokens, JWT, and Authentication Security

This article explains the principles, structure, and workflow of token‑based authentication—including access and refresh tokens, JWT, CSRF attacks, same‑origin policy, cross‑origin solutions, and common encryption algorithms—highlighting their advantages, limitations, and practical usage in modern web and mobile applications.

AuthenticationJWTSecurity
0 likes · 18 min read
Understanding Tokens, JWT, and Authentication Security
php Courses
php Courses
May 20, 2023 · Information Security

Three Methods to Prevent CSRF Attacks in PHP Applications

This article explains three practical techniques—CSRF token validation, read‑only cookie verification, and duplicate‑submission prevention—illustrated with complete PHP code examples, to help developers protect their web applications from cross‑site request forgery attacks.

CSRFTokenduplicate submission
0 likes · 6 min read
Three Methods to Prevent CSRF Attacks in PHP Applications
Top Architect
Top Architect
Feb 11, 2023 · Backend Development

Comprehensive Guide to User Login Flow, Token Management, and Anonymous Access in Backend Systems

This article explains the complete user login process, including mobile verification, token generation, token expiration policies, request‑rate limiting with Redis, anonymous request handling, blacklist management, and provides full Java Spring code examples for implementing these backend authentication mechanisms.

API SecurityAuthenticationBackend
0 likes · 11 min read
Comprehensive Guide to User Login Flow, Token Management, and Anonymous Access in Backend Systems
Selected Java Interview Questions
Selected Java Interview Questions
Feb 6, 2023 · Backend Development

Backend Token Authentication, Rate Limiting, and Anonymous Access Design

This article explains a comprehensive backend user login flow, covering token generation, expiration policies, request validation, logout handling, anonymous access strategies, rate‑limiting with authorized tokens, path‑regex filtering, blacklist management, and includes a Spring‑Redis implementation example.

AuthenticationBackendToken
0 likes · 9 min read
Backend Token Authentication, Rate Limiting, and Anonymous Access Design
Top Architect
Top Architect
Nov 23, 2022 · Information Security

Comprehensive Guide to Front‑End Authentication and Authorization Methods

This article provides an in‑depth overview of authentication, authorization, and permission control concepts and compares ten common front‑end authentication techniques—including HTTP Basic Auth, Session‑Cookie, Token, JWT, SSO, OAuth 2.0, QR‑code login and one‑click login—detailing their workflows, advantages, drawbacks, and typical usage scenarios.

AuthenticationAuthorizationJWT
0 likes · 39 min read
Comprehensive Guide to Front‑End Authentication and Authorization Methods
IT Architects Alliance
IT Architects Alliance
Nov 17, 2022 · Information Security

Comprehensive Guide to Frontend Authentication Methods and Their Differences

This article explains the concepts, relationships, and practical implementations of authentication, authorization, and access control, and compares ten common frontend authentication methods—including HTTP Basic, Session‑Cookie, Token, JWT, SSO, OAuth, and QR‑code login—detailing their workflows, advantages, disadvantages, and suitable scenarios.

JWTOAuthSSO
0 likes · 37 min read
Comprehensive Guide to Frontend Authentication Methods and Their Differences
Top Architect
Top Architect
Nov 4, 2022 · Information Security

Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth

This article reviews four widely used authentication mechanisms—HTTP Basic authentication, session‑cookie based authentication, token (JWT) authentication, and OAuth 2.0—explaining their workflows, security characteristics, and providing Node.js/Express code examples for each.

AuthenticationExpressHTTP Basic
0 likes · 18 min read
Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth
php Courses
php Courses
Sep 5, 2022 · Frontend Development

10 Common Frontend Authentication Methods and Their Use Cases

This article introduces ten widely used frontend authentication techniques—including HTTP Basic Auth, Session‑Cookie, Token, JWT, SSO, OAuth 2.0, QR‑code login, one‑click login, and more—explaining their scenarios, advantages, and security considerations.

JWTTokenfrontend
0 likes · 3 min read
10 Common Frontend Authentication Methods and Their Use Cases
IT Services Circle
IT Services Circle
Aug 23, 2022 · Information Security

Comprehensive Overview of Authentication, Authorization, and Access Control Methods

This article provides an in‑depth guide to authentication, authorization, and access control, covering basic HTTP authentication, session‑cookie mechanisms, token‑based approaches, JWT structure, single sign‑on (SSO), OAuth 2.0 flows, unique login enforcement, QR‑code login, and one‑click mobile login, with practical code examples and diagrams.

AuthenticationAuthorizationJWT
0 likes · 36 min read
Comprehensive Overview of Authentication, Authorization, and Access Control Methods
Selected Java Interview Questions
Selected Java Interview Questions
Aug 9, 2022 · Backend Development

Understanding and Implementing Idempotency in Backend APIs with Spring Boot and Redis

This article explains the concept of idempotency, why it is needed for HTTP interfaces, the impact on system design, and presents several practical backend solutions—including database unique keys, optimistic locking, anti‑repeat tokens, and downstream sequence numbers—accompanied by complete Spring Boot code examples using Redis for token management.

Backend DevelopmentREST APISpring Boot
0 likes · 20 min read
Understanding and Implementing Idempotency in Backend APIs with Spring Boot and Redis
Top Architect
Top Architect
Jul 29, 2022 · Backend Development

Implementing API Idempotency in Spring Boot Using Tokens, Database Primary Keys, Optimistic Locks, and Redis

This article explains the concept of idempotency in computing and HTTP, why it is essential for APIs, the impact on system design, which RESTful methods are idempotent, and presents four practical implementation strategies—including database primary keys, optimistic locking, anti‑repeat tokens, and downstream sequence numbers—accompanied by complete Spring Boot code examples and testing procedures.

APIIdempotencyJava
0 likes · 22 min read
Implementing API Idempotency in Spring Boot Using Tokens, Database Primary Keys, Optimistic Locks, and Redis
IT Services Circle
IT Services Circle
Jun 23, 2022 · Information Security

Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions

This article provides an in‑depth overview of JSON Web Tokens (JWT), explaining their structure, authentication workflow, advantages such as statelessness and CSRF protection, drawbacks like revocation difficulty, and presents practical solutions including blacklist, secret rotation, short‑lived tokens and refresh‑token strategies.

AuthenticationBackendCSRF
0 likes · 13 min read
Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions
Programmer DD
Programmer DD
Jun 10, 2022 · Information Security

Migrate Spring OAuth to Spring Authorization Server with Java 8

This article explains how to migrate from the deprecated Spring Security OAuth to Spring Authorization Server, covering Java 8 compatibility, extended grant types, Redis token storage, token formatting enhancements, custom authorization code handling, and resource server improvements, all demonstrated on the PIG microservice platform.

Authorization ServerJava 8OAuth2
0 likes · 6 min read
Migrate Spring OAuth to Spring Authorization Server with Java 8
Java Architecture Diary
Java Architecture Diary
Jun 6, 2022 · Information Security

Integrating Spring Authorization Server in PIG v3.5: Secure OAuth2 Migration Guide

This article explains how the PIG microservice platform v3.5 adds official Spring Authorization Server support, covering background, Java compatibility, Maven dependency configuration, extended grant types, Redis token storage, token formatting and enhancement, and customized resource server introspection for a seamless OAuth2 migration.

JavaMicroserviceSpring Authorization Server
0 likes · 5 min read
Integrating Spring Authorization Server in PIG v3.5: Secure OAuth2 Migration Guide
ByteFE
ByteFE
May 23, 2022 · Backend Development

Design and Implementation of ByteDance Wallet Asset Platform for the 2022 Spring Festival Activity Across Eight Apps

The article details the architecture, challenges, and solutions of ByteDance's wallet asset platform that unified reward issuance, display, and usage across eight applications during the 2022 Spring Festival, covering high‑traffic order processing, token‑based asynchronous settlement, budget control, stability mechanisms, and future evolution.

BackendDistributed SystemsMicroservices
0 likes · 29 min read
Design and Implementation of ByteDance Wallet Asset Platform for the 2022 Spring Festival Activity Across Eight Apps
Top Architect
Top Architect
Apr 5, 2022 · Information Security

Understanding JSON Web Token (JWT): Structure, Creation, and Signature

This article explains the lightweight JWT specification, demonstrates how to build a token with header, payload, and signature using Base64 encoding and Node.js, and discusses its security properties, verification process, and suitable use cases for web authentication.

AuthenticationBase64JWT
0 likes · 9 min read
Understanding JSON Web Token (JWT): Structure, Creation, and Signature
Architect's Guide
Architect's Guide
Mar 27, 2022 · Information Security

Understanding JSON Web Tokens (JWT): Structure, Creation, and Practical Use

This article explains the lightweight JWT specification, walks through its three-part structure (header, payload, signature), shows how to encode and sign a token with Node.js, and demonstrates using a JWT‑based link to perform a friend‑request operation without requiring the recipient to log in.

AuthenticationBase64JWT
0 likes · 8 min read
Understanding JSON Web Tokens (JWT): Structure, Creation, and Practical Use
Su San Talks Tech
Su San Talks Tech
Mar 8, 2022 · Information Security

Cookie vs Session vs JWT: Choosing the Right Authentication Strategy

This article compares cookies, server-side sessions, and JWT tokens, explaining their mechanisms, advantages, drawbacks, and best-use scenarios for web authentication, load‑balanced environments, and mobile applications, while also addressing security concerns such as CSRF and token storage.

CookieSessionToken
0 likes · 15 min read
Cookie vs Session vs JWT: Choosing the Right Authentication Strategy
Architecture and Beyond
Architecture and Beyond
Jan 17, 2022 · Information Security

Understanding Web Session Management: Concepts, Storage Strategies, and Token‑Based Authentication

This article explains the fundamentals of web session management, compares server‑side, cookie‑based, and token‑based storage methods, discusses authentication versus authorization, and outlines security considerations and best‑practice recommendations for managing user sessions in modern web applications.

AuthorizationBackendCookie
0 likes · 11 min read
Understanding Web Session Management: Concepts, Storage Strategies, and Token‑Based Authentication
Top Architect
Top Architect
Dec 24, 2021 · Backend Development

Token, Timestamp, and Sign: Implementing Secure API Authentication with Spring Boot and Redis

This article explains the concepts of token, timestamp, and sign, describes how they are used together to secure API calls, shows how to prevent duplicate submissions, and provides complete Spring Boot code examples—including Redis configuration, interceptors, utilities, and ThreadLocal handling—for building a robust backend authentication system.

AuthenticationTokenapi-security
0 likes · 23 min read
Token, Timestamp, and Sign: Implementing Secure API Authentication with Spring Boot and Redis
ELab Team
ELab Team
Dec 24, 2021 · Information Security

Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation

This article explores the challenges of cross‑domain login state sharing, compares JWT, session‑cookie, and SSO solutions such as CAS and OAuth, details their structures, security considerations, and provides a step‑by‑step guide to building a simple SSO demo with code snippets and diagrams.

CASJWTOAuth
0 likes · 25 min read
Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation
Selected Java Interview Questions
Selected Java Interview Questions
Dec 22, 2021 · Backend Development

User Login Flow, Token Management, and Anonymous Access Implementation in a Java Backend

This article explains the complete user login process, token generation and validation, token expiration policies, logout handling, and two approaches for anonymous requests—authorized tokens with rate limiting and path‑based regex rules—illustrated with diagrams and Java/Redis code examples.

AuthenticationSecurityToken
0 likes · 9 min read
User Login Flow, Token Management, and Anonymous Access Implementation in a Java Backend
IT Architects Alliance
IT Architects Alliance
Dec 9, 2021 · Backend Development

How to Build a Billion‑User Scalable User Center: Architecture, APIs, Token Fallback, and Security

This article presents a comprehensive, practical design for an ultra‑large‑scale user center, covering microservice architecture, API separation, token generation with graceful degradation, data‑sharding strategies, password encryption, asynchronous processing, and detailed monitoring to ensure high availability, performance, and security.

MicroservicesScalabilitySecurity
0 likes · 16 min read
How to Build a Billion‑User Scalable User Center: Architecture, APIs, Token Fallback, and Security
Architecture Digest
Architecture Digest
Dec 3, 2021 · Backend Development

Design Practices for a Billion‑Scale User Center

This article presents a comprehensive set of design practices for building a highly available, high‑performance, and secure user‑center system that can handle hundreds of millions of users, covering service architecture, API design, token degradation, data sharding, security, asynchronous processing, and monitoring.

ScalabilityTokendatabase sharding
0 likes · 15 min read
Design Practices for a Billion‑Scale User Center
Architect
Architect
Nov 16, 2021 · Backend Development

Implementing API Idempotency with Spring Boot, Redis, and Custom Annotations

This article explains how to achieve reliable API idempotency in Spring Boot applications by using Redis for token storage, defining a custom @AutoIdempotent annotation, configuring an interceptor to enforce token checks, and providing complete Java code examples and testing steps.

IdempotencyInterceptorJava
0 likes · 9 min read
Implementing API Idempotency with Spring Boot, Redis, and Custom Annotations
Java Architect Essentials
Java Architect Essentials
Oct 8, 2021 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, details token types such as access and refresh tokens, introduces JWT principles and usage, and discusses security considerations and distributed session‑sharing strategies for modern web applications.

AuthenticationAuthorizationCookie
0 likes · 22 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT
MaGe Linux Operations
MaGe Linux Operations
Sep 7, 2021 · Information Security

How QR Code Login Works: From Scanning to Secure Token Authentication

QR code login lets users authenticate on a PC by scanning a code with a pre‑logged‑in mobile app, using a token‑based system that verifies identity without transmitting passwords, and involves QR generation, status polling, temporary tokens, and final confirmation to securely log in.

AuthenticationMobileQR code
0 likes · 12 min read
How QR Code Login Works: From Scanning to Secure Token Authentication
IT Architects Alliance
IT Architects Alliance
Aug 25, 2021 · Information Security

Understanding Single Sign-On (SSO) Mechanism and Java Implementation

This article explains the stateless nature of HTTP, the session and cookie mechanisms for single‑system login, the challenges of multi‑system environments, and provides a detailed overview of Single Sign‑On (SSO) concepts, token flow, and step‑by‑step Java code examples for client and server implementations.

AuthenticationJavaSSO
0 likes · 14 min read
Understanding Single Sign-On (SSO) Mechanism and Java Implementation
21CTO
21CTO
Aug 25, 2021 · Information Security

Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens

This article examines common security flaws in basic web login forms, demonstrates how plain‑text passwords can be intercepted, and presents practical countermeasures such as client‑side encryption, hashing, captchas, tokens, and digital signatures to protect credentials and data integrity.

CaptchaMD5Token
0 likes · 13 min read
Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens
Top Architect
Top Architect
Aug 23, 2021 · Information Security

Security Considerations for Web Login: From Plain HTTP to Encryption, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, illustrating how plain HTTP exposes credentials, evaluating symmetric and asymmetric encryption, token-based authentication, and digital signatures, and proposes layered protection strategies such as MD5 hashing, CAPTCHA, and token mechanisms to safeguard user data.

MD5TokenWeb Security
0 likes · 12 min read
Security Considerations for Web Login: From Plain HTTP to Encryption, Tokens, and Digital Signatures
macrozheng
macrozheng
Aug 16, 2021 · Information Security

Understanding Authentication, Authorization, and Tokens: A Practical Guide

This article explains the core concepts of authentication and authorization in Java web applications, distinguishes between credentials, cookies, sessions, access tokens, refresh tokens, and JWTs, and compares their security, storage, and usage scenarios to help developers choose the right mechanism for their projects.

SessionToken
0 likes · 11 min read
Understanding Authentication, Authorization, and Tokens: A Practical Guide
Selected Java Interview Questions
Selected Java Interview Questions
Aug 15, 2021 · Information Security

Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, demonstrates how plain‑text passwords can be intercepted over HTTP/HTTPS, evaluates symmetric and asymmetric encryption, discusses the limitations of MD5, and proposes token‑based and digital‑signature solutions to protect credentials and data integrity.

AuthenticationHTTPSMD5
0 likes · 14 min read
Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures
Programmer DD
Programmer DD
Aug 2, 2021 · Information Security

Why Simple HTML Login Forms Leak Passwords and How to Secure Them

This article examines common security flaws in basic HTML login forms, demonstrates how plaintext passwords can be intercepted over HTTP, evaluates symmetric and asymmetric encryption, discusses the limitations of HTTPS, and proposes practical safeguards such as MD5 hashing, token-based authentication, captchas, and digital signatures to protect user credentials.

HTTPSMD5Token
0 likes · 14 min read
Why Simple HTML Login Forms Leak Passwords and How to Secure Them
Java Interview Crash Guide
Java Interview Crash Guide
Jul 13, 2021 · Information Security

Mastering Token-Based Authentication: Types, Scenarios, and Best Practices

This article analyzes various token‑based authentication methods across multiple client scenarios, categorizes tokens into password, session, and API types, compares their natural and controllable attributes, outlines hierarchical relationships, and offers design guidelines to improve security, privacy, and usability in multi‑client systems.

APITokenaccess control
0 likes · 14 min read
Mastering Token-Based Authentication: Types, Scenarios, and Best Practices
Java Architect Essentials
Java Architect Essentials
Jul 9, 2021 · Information Security

How Single Sign-On (SSO) Works: From Session Basics to Full Implementation

This article explains the stateless nature of HTTP, how session and cookie mechanisms enable login state in a single web system, the challenges of multi‑system environments, and provides a step‑by‑step guide with code examples for building a Java‑based Single Sign‑On solution, including token generation, validation, and logout handling.

AuthenticationJavaSSO
0 likes · 17 min read
How Single Sign-On (SSO) Works: From Session Basics to Full Implementation
IT Architects Alliance
IT Architects Alliance
Jul 7, 2021 · Backend Development

Mastering Single Sign-On: From Session Basics to Java Implementation

This article explains the stateless nature of HTTP, introduces session and cookie mechanisms for single‑system login, discusses the challenges of multi‑system applications, and provides a step‑by‑step guide with Java code to implement Single Sign‑On (SSO) including login, token verification, global and local sessions, and coordinated logout.

Backend DevelopmentJavaSSO
0 likes · 16 min read
Mastering Single Sign-On: From Session Basics to Java Implementation
Top Architect
Top Architect
Jul 3, 2021 · Backend Development

Three Practical Methods for Implementing Single Sign-On (SSO) in B/S Systems

This article explains the principle of single sign‑on and compares three implementation techniques—parent‑domain cookies, a dedicated authentication centre, and cross‑domain LocalStorage—detailing their mechanisms, advantages, limitations, and providing sample code for the LocalStorage approach.

AuthenticationCookieSSO
0 likes · 11 min read
Three Practical Methods for Implementing Single Sign-On (SSO) in B/S Systems
IT Architects Alliance
IT Architects Alliance
Jun 21, 2021 · Information Security

Token-Based Identity Authentication: Classification, Scenarios, and Security Considerations

This article analyses various client‑side authentication scenarios, classifies token types such as password, session, and API tokens, compares their cost, risk, and controllable attributes, and proposes a layered token architecture to improve security, privacy, and usability across multiple platforms.

AuthenticationSecuritySession
0 likes · 13 min read
Token-Based Identity Authentication: Classification, Scenarios, and Security Considerations
macrozheng
macrozheng
May 31, 2021 · Information Security

Cookie vs Session vs JWT: When to Use Each for Secure Authentication

This article compares the mechanisms of Cookie, Session, and JWT token for user authentication, explaining their histories, workflows, scalability challenges, security trade‑offs, and best‑practice scenarios such as single sign‑on, mobile access, and CSRF protection.

CookieSessionToken
0 likes · 16 min read
Cookie vs Session vs JWT: When to Use Each for Secure Authentication
IT Architects Alliance
IT Architects Alliance
May 5, 2021 · Information Security

Token-Based Identity Authentication: Scenarios, Types, and Hierarchical Design

This article analyzes various client scenarios in multi‑client systems, classifies authentication tokens into password, session, and interface categories, compares their natural and controllable attributes, and proposes a layered token hierarchy to improve security, privacy, and usability across web, mobile, and API platforms.

AuthenticationSecurityToken
0 likes · 9 min read
Token-Based Identity Authentication: Scenarios, Types, and Hierarchical Design
Programmer DD
Programmer DD
May 4, 2021 · Information Security

How QR Code Login Works: From Token Generation to Secure Authentication

This article explains the underlying principles of QR code login, detailing how the system identifies users, proves their identity through token‑based authentication, and manages the state transitions from scanning to confirmation, while also covering the role of QR code generation and temporary tokens.

AuthenticationQR codeToken
0 likes · 12 min read
How QR Code Login Works: From Token Generation to Secure Authentication
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Apr 18, 2021 · Backend Development

Idempotency: Definition, Scenarios, and Implementation Strategies

The article explains the concept of idempotency, distinguishes it from duplicate submissions, outlines typical use cases such as network retries and form resubmissions, and presents various backend solutions—including unique indexes, deduplication tables, pessimistic and optimistic locks, distributed locks, and token‑based approaches—complete with SQL examples.

IdempotencyTokenoptimistic lock
0 likes · 11 min read
Idempotency: Definition, Scenarios, and Implementation Strategies
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Apr 4, 2021 · Information Security

Mastering CSRF Protection in Spring Boot: From Theory to Code

This guide explains what CSRF attacks are, outlines common defense strategies such as captchas, referer checks, and token validation, and provides a complete Spring Boot implementation—including custom annotations, token storage with Guava or Redis, an interceptor, configuration, and a token‑generation endpoint—complete with testing steps.

CSRFInterceptorSecurity
0 likes · 8 min read
Mastering CSRF Protection in Spring Boot: From Theory to Code
Open Source Linux
Open Source Linux
Mar 31, 2021 · Information Security

How QR Code Login Works: From Tokens to Secure Authentication

This article explains the principles behind QR codes, how they are used for secure login by transmitting identity and proof through token‑based authentication, and walks through each step of the QR‑code login flow from generation to confirmation.

AuthenticationBackendMobile
0 likes · 11 min read
How QR Code Login Works: From Tokens to Secure Authentication
Top Architect
Top Architect
Mar 30, 2021 · Backend Development

Understanding Idempotency and Its Implementation in RESTful APIs

This article explains the concept of idempotency, why it is essential for HTTP interfaces, the impact on system design, and presents several practical implementation strategies—including unique primary keys, optimistic locking, anti‑repeat tokens, and downstream sequence numbers—accompanied by a complete Spring Boot example with Redis integration and test code.

IdempotencyJavaREST API
0 likes · 21 min read
Understanding Idempotency and Its Implementation in RESTful APIs
Top Architect
Top Architect
Feb 15, 2021 · Backend Development

Implementing API Idempotency in SpringBoot Using Redis Token Mechanism

This tutorial explains the concept of idempotency, why it is needed for reliable APIs, the impact on system design, and provides four implementation strategies—including a detailed SpringBoot example that uses Redis tokens, Lua scripts, and unit tests—to ensure that repeated requests produce the same result without side effects.

IdempotencyJavaRESTful API
0 likes · 18 min read
Implementing API Idempotency in SpringBoot Using Redis Token Mechanism
Code Ape Tech Column
Code Ape Tech Column
Feb 4, 2021 · Backend Development

Implementing API Idempotency in SpringBoot Using Token and Redis

This article explains the concept of idempotency, why it is needed for HTTP interfaces, its impact on system design, and presents four practical backend solutions—including database primary keys, optimistic locking, anti‑repeat tokens, and downstream sequence numbers—followed by a complete SpringBoot example with Maven dependencies, Redis configuration, token utility code, controller, application starter, and test cases.

IdempotencyJavaRESTful API
0 likes · 20 min read
Implementing API Idempotency in SpringBoot Using Token and Redis
Code Ape Tech Column
Code Ape Tech Column
Feb 2, 2021 · Information Security

JWT vs OAuth2: Which API Security Method Fits Your Needs?

This article explains the fundamental differences between JSON Web Tokens (JWT) and OAuth 2.0, outlines their structures, roles, and grant types, compares implementation effort and risk, and provides guidance on choosing the right approach for various API security scenarios.

API SecurityAuthenticationAuthorization
0 likes · 11 min read
JWT vs OAuth2: Which API Security Method Fits Your Needs?
21CTO
21CTO
Jan 18, 2021 · Backend Development

Mastering Single Sign-On: Cookie, Auth Center, and LocalStorage Strategies

This article explains three practical Single Sign‑On implementations—parent‑domain cookies, a dedicated authentication center, and cross‑domain LocalStorage—detailing their mechanisms, advantages, limitations, and code examples for secure token sharing across multiple web applications.

AuthenticationCookieSSO
0 likes · 11 min read
Mastering Single Sign-On: Cookie, Auth Center, and LocalStorage Strategies
Java Interview Crash Guide
Java Interview Crash Guide
Jan 8, 2021 · Backend Development

Mastering API Idempotency: Strategies, Code Samples, and Best Practices

Idempotency ensures that repeated API calls produce the same effect as a single call, preventing duplicate submissions, token misuse, and inconsistent data; this guide explains the concept, its importance, HTTP definitions, impact on systems, and presents four practical implementation methods—unique keys, optimistic locking, token‑based guards, and sequence numbers—with full SpringBoot and Redis code examples.

APIIdempotencySpringBoot
0 likes · 20 min read
Mastering API Idempotency: Strategies, Code Samples, and Best Practices
Code Ape Tech Column
Code Ape Tech Column
Jan 8, 2021 · Information Security

Implementing Single Sign‑On (SSO) in B/S Systems: Cookie, Authentication Center, and LocalStorage Approaches

This article explains how Single Sign‑On works in browser‑server applications, compares three implementation methods—parent‑domain cookies, a dedicated authentication center, and cross‑domain LocalStorage with iframe/postMessage—and provides sample code for the latter technique.

AuthenticationCookieSSO
0 likes · 10 min read
Implementing Single Sign‑On (SSO) in B/S Systems: Cookie, Authentication Center, and LocalStorage Approaches
Architecture Digest
Architecture Digest
Dec 25, 2020 · Information Security

Token-Based Identity Authentication System: Classification, Scenarios, and Hierarchical Design

This article analyzes token-based identity authentication in multi‑client information systems, classifies various token types, compares their natural and controllable attributes, proposes a four‑layer hierarchy, and discusses practical usage scenarios and design principles to improve security and privacy.

AuthenticationSecuritySession
0 likes · 9 min read
Token-Based Identity Authentication System: Classification, Scenarios, and Hierarchical Design
Code Ape Tech Column
Code Ape Tech Column
Dec 16, 2020 · Backend Development

Understanding Idempotency and Implementing It in Spring Boot with Redis

This article explains the concept of idempotency, why it is needed for reliable API design, compares HTTP method idempotence, and presents four practical backend solutions—including unique primary keys, optimistic locking, anti‑repeat tokens, and downstream sequence numbers—accompanied by Spring Boot and Redis code examples.

JavaREST APISpring Boot
0 likes · 20 min read
Understanding Idempotency and Implementing It in Spring Boot with Redis
Programmer DD
Programmer DD
Dec 12, 2020 · Information Security

Designing a Secure Multi‑Client Token Authentication System

This article analyzes various client scenarios in modern information systems, categorizes authentication tokens, compares their natural and controllable attributes, proposes a hierarchical token model, and outlines best‑practice principles to achieve secure, privacy‑preserving identity verification across web, mobile, and API platforms.

Tokenaccess controlidentity
0 likes · 11 min read
Designing a Secure Multi‑Client Token Authentication System
IT Xianyu
IT Xianyu
Nov 25, 2020 · Backend Development

Implementing Single Sign-On (SSO) in B/S Systems: Cookie, Authentication Center, and LocalStorage Approaches

This article explains three practical SSO implementation methods—using a parent‑domain cookie, deploying an authentication center, and leveraging LocalStorage with iframe/postMessage—to share session IDs or tokens across multiple web applications, discussing their advantages, limitations, and code examples.

Authentication CenterCookieJavaScript
0 likes · 10 min read
Implementing Single Sign-On (SSO) in B/S Systems: Cookie, Authentication Center, and LocalStorage Approaches
Senior Brother's Insights
Senior Brother's Insights
Nov 22, 2020 · Backend Development

Prevent Duplicate Submissions with JWT Tokens in a Java Backend

This article explains how to use JWT tokens in a Java backend to prevent duplicate form submissions, covering the problem of repeated clicks, two mitigation approaches, detailed token generation utilities, session handling methods, and practical code examples for creating, validating, and managing tokens.

BackendJWTJava
0 likes · 12 min read
Prevent Duplicate Submissions with JWT Tokens in a Java Backend
Top Architect
Top Architect
Oct 29, 2020 · Backend Development

Implementing API Idempotency in Spring Boot Using Redis and Token Mechanism

This article explains the concept of API idempotency, presents common solutions such as unique indexes, token mechanisms, and distributed locks, and provides a complete Spring Boot implementation using Redis to generate, store, and validate tokens via custom annotations, interceptors, and service classes, including testing and performance verification.

APIIdempotencyInterceptor
0 likes · 14 min read
Implementing API Idempotency in Spring Boot Using Redis and Token Mechanism
Efficient Ops
Efficient Ops
Oct 14, 2020 · Information Security

Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication

This article traces the evolution from early stateless web browsing to modern token‑based authentication, explaining how session management challenges led to centralized stores, their drawbacks, and how signed tokens using HMAC‑SHA256 provide a scalable, secure, and truly stateless alternative.

AuthenticationHMACSession
0 likes · 15 min read
Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication
Architect's Tech Stack
Architect's Tech Stack
Sep 30, 2020 · Backend Development

Implementing API Idempotency with Redis Token Mechanism in Spring Boot

This article explains the concept of API idempotency, reviews common solutions, and provides a complete Spring Boot implementation using a Redis‑based token mechanism, custom @ApiIdempotent annotation, interceptor, and supporting services, along with testing and important concurrency considerations.

APIIdempotencyInterceptor
0 likes · 14 min read
Implementing API Idempotency with Redis Token Mechanism in Spring Boot
Selected Java Interview Questions
Selected Java Interview Questions
Sep 23, 2020 · Backend Development

Implementing Single Sign-On (SSO) in Web Applications: Cookie, Authentication Center, and LocalStorage Approaches

This article explains three practical methods for achieving Single Sign‑On in web systems—using a parent‑domain cookie, deploying a dedicated authentication center, and leveraging front‑end LocalStorage with iframe postMessage—to share session or token information across multiple domains.

AuthenticationCookieSSO
0 likes · 11 min read
Implementing Single Sign-On (SSO) in Web Applications: Cookie, Authentication Center, and LocalStorage Approaches
Java Captain
Java Captain
Sep 14, 2020 · Backend Development

Implementing API Idempotency with Redis Token Mechanism in Spring Boot

This article explains the concept of API idempotency, outlines common solutions, and provides a complete Spring Boot implementation using Redis and a token mechanism, including custom annotation, interceptor, utility classes, and testing procedures to ensure safe, single‑execution requests.

InterceptorSpring BootToken
0 likes · 17 min read
Implementing API Idempotency with Redis Token Mechanism in Spring Boot
ITPUB
ITPUB
Sep 11, 2020 · Blockchain

How Red Pulse Secured Its Blockchain Platform: Real‑World Attack Lessons

This article details Red Pulse's journey of integrating the NEO blockchain, the security vulnerabilities it faced—from token theft and credential‑stuffing attacks to sophisticated social‑engineering exploits—and the comprehensive technical measures, monitoring tools, and mitigation strategies it implemented to protect its platform and users.

Attack MitigationBlockchainNEO
0 likes · 21 min read
How Red Pulse Secured Its Blockchain Platform: Real‑World Attack Lessons
macrozheng
macrozheng
Sep 1, 2020 · Information Security

Why JWT Is Both Loved and Criticized: A Deep Dive into Token Authentication

This article compares traditional cookie‑session authentication with JWT, explains JWT’s three‑part structure, shows how to generate and verify tokens in Java, and discusses security benefits, pitfalls, and practical considerations for modern web and mobile applications.

JWTJavaSecurity
0 likes · 14 min read
Why JWT Is Both Loved and Criticized: A Deep Dive into Token Authentication
Top Architect
Top Architect
Aug 16, 2020 · Backend Development

Implementing API Idempotency in Spring Boot Using Redis and Token Mechanism

This article explains how to achieve API idempotency in a Spring Boot application by generating unique tokens, storing them in Redis, and using a custom @ApiIdempotent annotation with an interceptor to prevent duplicate requests, including code examples, configuration, and testing procedures.

APIIdempotencyInterceptor
0 likes · 14 min read
Implementing API Idempotency in Spring Boot Using Redis and Token Mechanism
Programmer DD
Programmer DD
Jul 25, 2020 · Backend Development

Designing Simple Yet Secure API Authentication for Internal Services

This article walks through practical methods for securing internal API calls—starting with simple token checks, then enhancing security with IP whitelisting, salted signatures, and timestamped requests—while weighing trade‑offs like HTTPS overhead and time synchronization.

API authenticationBackend SecurityToken
0 likes · 6 min read
Designing Simple Yet Secure API Authentication for Internal Services
Programmer DD
Programmer DD
Jun 23, 2020 · Information Security

How to Secure API Calls with Tokens, Timestamps, and Signatures in Spring Boot

This article explains practical methods for protecting API data exchange—including token usage, timestamp validation, signature generation, duplicate‑submission prevention, and ThreadLocal context—provides implementation details with Spring Boot, Redis, and Java code examples, and discusses related security considerations such as DoS attacks.

API SecurityJavaSpring Boot
0 likes · 26 min read
How to Secure API Calls with Tokens, Timestamps, and Signatures in Spring Boot
Top Architect
Top Architect
Jun 19, 2020 · Information Security

Evolution of Session Management and Token‑Based Authentication

The article traces the history of web session handling, explains the scalability and security challenges of server‑side sessions, and introduces stateless token‑based authentication using signed HMAC‑SHA256 tokens as a modern solution for scalable, secure web applications.

HMACSessionToken
0 likes · 14 min read
Evolution of Session Management and Token‑Based Authentication
Java Captain
Java Captain
May 31, 2020 · Information Security

Common API Security Practices: Token, Timestamp, Signature, and Duplicate Submission Prevention in Java

This article explains practical API security techniques for protecting data exchange with third‑party systems, covering token generation and storage, timestamp validation to mitigate DoS attacks, MD5‑based request signing with nonce, preventing duplicate submissions using Redis, and illustrates the concepts with comprehensive Java code examples.

API SecurityBackend DevelopmentJava
0 likes · 23 min read
Common API Security Practices: Token, Timestamp, Signature, and Duplicate Submission Prevention in Java
Laravel Tech Community
Laravel Tech Community
May 13, 2020 · Backend Development

How QR Code Login Works: From Web Page to Mobile Server

This article explains the end‑to‑end implementation of QR‑code login, covering how a web page requests a QR image, how the server stores a UUID in Redis, how a mobile app scans the code and validates the user, and how the browser finally receives a token to complete authentication.

MobileQR loginToken
0 likes · 5 min read
How QR Code Login Works: From Web Page to Mobile Server
Top Architect
Top Architect
Apr 15, 2020 · Information Security

Evolution of Session Management and Token‑Based Authentication in Web Applications

The article traces the history of web session handling from simple document browsing to the challenges of storing session IDs in clustered servers, and explains how token‑based authentication using signed tokens like HMAC‑SHA256 provides a stateless, scalable, and more secure alternative for modern web and mobile applications.

SessionTokenstateless
0 likes · 12 min read
Evolution of Session Management and Token‑Based Authentication in Web Applications
Laravel Tech Community
Laravel Tech Community
Apr 14, 2020 · Information Security

How to Secure Laravel APIs with Passport: A Complete OAuth2 Guide

This guide explains how to use Laravel Passport to implement OAuth2 authentication for API endpoints, covering installation, database migrations, token generation, client management, scope definition, route protection, JavaScript integration, event handling, and testing with detailed code examples.

API authenticationLaravelOAuth2
0 likes · 25 min read
How to Secure Laravel APIs with Passport: A Complete OAuth2 Guide