Tagged articles
13 articles
Page 1 of 1
Architect's Guide
Architect's Guide
Sep 7, 2025 · Backend Development

User Login & Token Management: Flow, Rate Limiting, and Security

This article explains the complete user login process, from mobile verification and automatic registration to token generation, validation, expiration policies, logout handling, anonymous access strategies, rate‑limiting via authorized tokens, path‑regex checks, and blacklist management, illustrated with diagrams and Java‑Spring code examples.

API SecurityUser Authenticationrate limiting
0 likes · 10 min read
User Login & Token Management: Flow, Rate Limiting, and Security
php Courses
php Courses
Mar 5, 2025 · Backend Development

PHP Session Management and User Authentication

This article explains PHP's session management mechanisms, basic session operations, security considerations, and various user authentication methods—including session‑based login, token‑based authentication, and password hashing—providing developers with practical guidance to build secure web applications.

BackendPHPUser Authentication
0 likes · 4 min read
PHP Session Management and User Authentication
MaGe Linux Operations
MaGe Linux Operations
Aug 30, 2024 · Databases

Master MongoDB: From Basics to Advanced Operations

This comprehensive guide walks you through MongoDB fundamentals, installation checks, service management, user authentication, database and collection creation, and essential CRUD commands, providing clear examples and code snippets to help you efficiently manage and query your NoSQL data.

CRUDDatabase ManagementMongoDB
0 likes · 13 min read
Master MongoDB: From Basics to Advanced Operations
php Courses
php Courses
Aug 9, 2023 · Backend Development

Building a Simple User Permission Management System with PHP

This article explains how to develop a simple yet powerful user permission management system for a blog using PHP, covering database schema design, user authentication, role and permission handling, and code examples for login, permission checks, and access control.

Database designPHPRole-Based Access Control
0 likes · 7 min read
Building a Simple User Permission Management System with PHP
IT Services Circle
IT Services Circle
Nov 19, 2022 · Information Security

New Internet Comment Service Management Regulations Effective December 15, 2022

The National Internet Information Office's revised Internet Comment Service Management Regulations, effective December 15, 2022, mandate real‑name authentication, user tiering, blacklist of serious defaulters, stringent personal data protection, pre‑review of news comments, and comprehensive security measures for online comment platforms.

Comment ManagementData ProtectionInternet Regulation
0 likes · 6 min read
New Internet Comment Service Management Regulations Effective December 15, 2022
BaiPing Technology
BaiPing Technology
Dec 27, 2021 · Backend Development

Understanding WeChat OpenID, UnionID, and AppID: A Complete Guide

This article explains how WeChat's Open Platform, Public Platform, and Mini Programs generate and use OpenID, UnionID, and AppID identifiers, illustrates their relationships across multiple accounts and apps, and provides practical advice on storing and migrating these IDs for reliable user authentication.

AppIdOpenIDPlatform Migration
0 likes · 13 min read
Understanding WeChat OpenID, UnionID, and AppID: A Complete Guide
Huajiao Technology
Huajiao Technology
Oct 15, 2019 · Frontend Development

High‑Efficiency Mini‑Program Development: Layout, Navigation, User System, and Optimization Practices

This article presents a comprehensive guide to building high‑efficiency WeChat mini‑programs, covering layout schemes, custom navigation and tab bars, user authentication flows, component architecture with a BasicPage wrapper, logging, data analysis, and performance optimizations such as preloading and independent sub‑package loading.

Component ArchitectureUser AuthenticationWeChat Mini Program
0 likes · 18 min read
High‑Efficiency Mini‑Program Development: Layout, Navigation, User System, and Optimization Practices
Tencent Cloud Developer
Tencent Cloud Developer
Mar 28, 2019 · Mobile Development

Community Mini-Program Feature Implementation Using Cloud Development

The guide shows how to create a WeChat community mini‑program with cloud development that lets users post text and up to six images, implements home, publishing, and personal‑center pages, handles data pagination, image preview and deletion, stores posts in cloud collections, manages user authorization and avatar display, and addresses typical permission and refresh problems.

JavaScriptUser AuthenticationWXML
0 likes · 12 min read
Community Mini-Program Feature Implementation Using Cloud Development
ITPUB
ITPUB
Apr 15, 2016 · Databases

Why MySQL Login Fails: Host/User Sorting Rules and a Real‑World Debugging Case

The article explains MySQL’s user authentication flow, detailing how the server loads and sorts the user table by host and user specificity, and walks through a real‑world replication user login issue that reveals a hidden empty‑user entry causing access denial.

Host MatchingReplicationUser Authentication
0 likes · 9 min read
Why MySQL Login Fails: Host/User Sorting Rules and a Real‑World Debugging Case