Tag

access token

1 views collected around this technical thread.

Top Architect
Top Architect
Dec 22, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article provides a comprehensive overview of OAuth2.0, explaining its core concepts, the roles of resource owner, client, authorization server, and resource server, illustrating the full authorization flow with diagrams, clarifying related terminology such as authentication, delegation, and roles, and finally noting additional promotional material.

AuthenticationOAuth2.0SSO
0 likes · 14 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
php中文网 Courses
php中文网 Courses
Jun 28, 2023 · Backend Development

Integrating PHP with WeChat Work: Step-by-Step Guide

This guide explains how to integrate PHP with WeChat Work by registering a corporate account, creating an application, obtaining credentials, using PHP’s HTTP requests to acquire access tokens, and sending messages or retrieving user data, including a complete code example.

APIBackend IntegrationMessaging
0 likes · 4 min read
Integrating PHP with WeChat Work: Step-by-Step Guide
Architect's Guide
Architect's Guide
Nov 17, 2022 · Backend Development

Designing an Open API Interface with Token Generation and Interceptor in Spring Boot

This article describes how to design an open API interface that issues time‑limited access tokens, defines the supporting database schema, implements token generation utilities, creates a token‑issuing endpoint, and secures all open‑API calls with a Spring MVC interceptor.

API securityDatabase DesignInterceptor
0 likes · 8 min read
Designing an Open API Interface with Token Generation and Interceptor in Spring Boot
Laravel Tech Community
Laravel Tech Community
Nov 1, 2022 · Information Security

GitLab CE/EE Access Token Leakage Vulnerability (CVE-2022-2882)

The advisory details a GitLab CE/EE vulnerability (CVE‑2022‑2882) that allows authenticated attackers to modify integration URLs and steal GitHub integration access tokens, lists affected versions across community and enterprise editions, and recommends upgrading to specific patched releases.

GitLabVulnerabilityaccess token
0 likes · 3 min read
GitLab CE/EE Access Token Leakage Vulnerability (CVE-2022-2882)
Top Architect
Top Architect
Oct 13, 2022 · Information Security

OAuth 2.0 Protocol Overview: Concepts, Grant Types, and Implementation Details

This article provides a comprehensive introduction to the OAuth 2.0 authorization framework, covering its core roles, token concepts, common usage scenarios, the four standard grant types with request/response examples, security considerations, and reference specifications.

APIGrant TypesOAuth2
0 likes · 23 min read
OAuth 2.0 Protocol Overview: Concepts, Grant Types, and Implementation Details
Top Architect
Top Architect
Oct 7, 2022 · Information Security

OAuth 2.0 Overview: Protocol Basics, Core Concepts, Grant Types and Token Flow

This article provides a comprehensive overview of OAuth 2.0, covering its protocol basics, core concepts, the four grant types, token issuance and refresh processes, request and response examples, and security considerations for implementing authentication and authorization in modern applications.

AuthenticationGrant TypesOAuth2
0 likes · 23 min read
OAuth 2.0 Overview: Protocol Basics, Core Concepts, Grant Types and Token Flow
Top Architect
Top Architect
Jun 29, 2022 · Information Security

OAuth 2.0 Protocol Overview and Grant Types

This article provides a comprehensive introduction to the OAuth 2.0 protocol, covering its core concepts, authorization flow, four grant types (authorization code, implicit, resource owner password credentials, client credentials), request and response parameters, token handling, and practical examples with code snippets.

AuthenticationGrant TypesOAuth2.0
0 likes · 22 min read
OAuth 2.0 Protocol Overview and Grant Types
Top Architect
Top Architect
Jun 18, 2022 · Information Security

OAuth 2.0 Protocol Overview and Authorization Flows

This article provides a comprehensive introduction to the OAuth 2.0 protocol, explaining its core concepts, the roles of resource owner, client, authorization server and resource server, and detailing the four grant types—authorization code, implicit, resource‑owner password credentials, and client credentials—along with token request/response formats and refresh token usage.

Grant TypesOAuth2.0Refresh Token
0 likes · 23 min read
OAuth 2.0 Protocol Overview and Authorization Flows
IT Architects Alliance
IT Architects Alliance
Jun 18, 2022 · Information Security

OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types

This article provides a comprehensive introduction to OAuth 2.0, covering its purpose, core roles, token types, four main grant flows (authorization code, implicit, resource‑owner password, client credentials), token refresh mechanisms, and practical request/response examples for developers.

Grant TypesOAuth2.0Security
0 likes · 22 min read
OAuth 2.0 Overview: Core Concepts, Authorization Flows, and Grant Types
IT Architects Alliance
IT Architects Alliance
Mar 21, 2022 · Information Security

OAuth2 and JWT Based Security Authentication Design and Implementation Overview

This article provides a comprehensive overview of a token‑based security authentication system, covering terminology, development background, objectives, functional points, technology selection, OAuth2 grant types, JWT fundamentals, authentication flow, credential renewal, and interface design for unified access control across microservices.

JWTMicroservicesOAuth2
0 likes · 10 min read
OAuth2 and JWT Based Security Authentication Design and Implementation Overview
Laravel Tech Community
Laravel Tech Community
Mar 21, 2022 · Information Security

Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases

This article explains the fundamental differences between JSON Web Token (JWT) and OAuth2, describes their structures, security considerations, and provides guidance on when to choose each method for protecting API access in modern applications.

API securityAuthenticationJWT
0 likes · 9 min read
Comparing JWT and OAuth2: Concepts, Implementation Details, and Use Cases
Selected Java Interview Questions
Selected Java Interview Questions
Dec 27, 2021 · Information Security

Understanding OAuth2: Concepts, Grant Types, and Spring Boot Implementation

This article explains the OAuth2 authorization framework, illustrates its principles with a delivery‑person analogy, details the four main grant types, and provides a step‑by‑step Spring Boot implementation including server configuration, resource protection, and Postman testing.

Grant TypesMicroservicesOAuth2
0 likes · 17 min read
Understanding OAuth2: Concepts, Grant Types, and Spring Boot Implementation
Architecture Digest
Architecture Digest
Feb 5, 2021 · Information Security

Token-Based Authentication Architecture Using OAuth2 and JWT

The article explains the design and implementation of a token‑based authentication system for micro‑services, covering terminology, business background, OAuth2 password‑grant flow, JWT usage, security advantages, functional modules, technical choices, detailed authentication workflow, and API design.

JWTMicroservicesOAuth2
0 likes · 10 min read
Token-Based Authentication Architecture Using OAuth2 and JWT
System Architect Go
System Architect Go
Jan 28, 2021 · Information Security

OAuth 2.0 Authorization Code and Implicit Grant Flows

This article explains the OAuth 2.0 protocol, describes its four grant types, focuses on the Authorization Code and Implicit flows, outlines the involved roles, token types, client registration steps, and provides detailed request‑response examples for both grant types.

Authorization CodeImplicit GrantOAuth 2.0
0 likes · 8 min read
OAuth 2.0 Authorization Code and Implicit Grant Flows
php中文网 Courses
php中文网 Courses
Dec 21, 2020 · Backend Development

Preventing Concurrent Access Issues with WeChat Access Tokens Using PHP File Lock (flock)

This article explains a real-world case where storing WeChat access tokens in a JSON file caused race conditions, analyzes the root cause, and demonstrates how to use PHP's flock() function with proper locking to safely read and write the token, including sample code.

WeChataccess tokenconcurrency
0 likes · 6 min read
Preventing Concurrent Access Issues with WeChat Access Tokens Using PHP File Lock (flock)
Architect
Architect
Jul 18, 2020 · Information Security

Understanding OAuth 2.0: Scenarios, Flow, and Implementation Details

This article explains the concept of OAuth, its typical use cases such as third‑party login, the roles of user, service provider, and platform, and provides a step‑by‑step flow with code examples for obtaining authorization codes, access tokens, and user information.

AuthenticationOAuthSecurity
0 likes · 11 min read
Understanding OAuth 2.0: Scenarios, Flow, and Implementation Details
FunTester
FunTester
Jun 12, 2020 · Mobile Development

WeChat OAuth2.0 Mobile Application Login Integration Guide

This guide explains how to integrate WeChat OAuth2.0 login into Android and iOS mobile applications, covering preparation, authorization flow, API calls for access tokens and user info, phone‑number binding, re‑login handling, and test case recommendations.

APIAndroidOAuth2.0
0 likes · 12 min read
WeChat OAuth2.0 Mobile Application Login Integration Guide
Java Architecture Diary
Java Architecture Diary
Apr 7, 2020 · Information Security

Why OAuth2 Tokens Miss expires_in and How Spring Security Handles It

The article examines why the demo environment of pig4cloud returns an OAuth2 access token without the expires_in field, contrasts it with a local deployment, analyzes the Spring Security OAuth2 token generation code, and explains that according to the OAuth2 specification the expires_in parameter should be returned even for permanently valid tokens.

OAuth2Spring Securityaccess token
0 likes · 4 min read
Why OAuth2 Tokens Miss expires_in and How Spring Security Handles It
FunTester
FunTester
Mar 14, 2020 · Mobile Development

WeChat OAuth2.0 Mobile Login Integration Guide

This guide explains how to integrate WeChat OAuth2.0 login into Android and iOS mobile applications, covering preparation, the authorization code flow, token exchange, user‑info retrieval, phone‑number binding, repeated login handling, and comprehensive test cases.

APIAndroidOAuth2.0
0 likes · 11 min read
WeChat OAuth2.0 Mobile Login Integration Guide
Top Architect
Top Architect
Mar 2, 2020 · Information Security

Token-Based Authentication: Scenarios, Types, Comparison, and Hierarchical Structure

This article analyses various client scenarios in multi‑client systems, classifies authentication tokens into password, session, API, and other categories, compares them across usage cost, change cost, and security risks, and presents a hierarchical token model with detailed usage steps and practical considerations.

AuthenticationSecurityaccess token
0 likes · 12 min read
Token-Based Authentication: Scenarios, Types, Comparison, and Hierarchical Structure