Tag

Authentication

1 views collected around this technical thread.

Code Ape Tech Column
Code Ape Tech Column
Jun 12, 2025 · Information Security

How to Build Single Sign‑On (SSO) with CAS and Session Sharing in Java

This article explains why multiple independent login systems hurt user experience and security, reviews traditional session mechanisms and their limitations in clustered environments, and then presents two session‑sharing strategies and a complete CAS‑based SSO solution with Java code examples.

AuthenticationCASJava
0 likes · 15 min read
How to Build Single Sign‑On (SSO) with CAS and Session Sharing in Java
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jun 6, 2025 · Backend Development

Secure Spring Boot 3 APIs: 5 Methods with Filters, Interceptors, AOP, OAuth2

This article presents five practical approaches to protect Spring Boot 3 API endpoints—including Filter, Interceptor, AOP combined with Filter, Spring Security, and OAuth2 integration—providing code examples, configuration steps, and screenshots to demonstrate authentication, authorization, and token handling for secure access control.

API securityAuthenticationAuthorization
0 likes · 11 min read
Secure Spring Boot 3 APIs: 5 Methods with Filters, Interceptors, AOP, OAuth2
Java Captain
Java Captain
Jun 3, 2025 · Information Security

Integrating Spring Security with Spring Boot for JWT Authentication and Authorization

This article demonstrates how to integrate Spring Security into a Spring Boot application, configure JWT‑based authentication, implement custom AES encryption, define user and role entities, set up service and controller layers, and configure security, filter, and CORS settings to achieve secure login and permission management.

AuthenticationAuthorizationJWT
0 likes · 19 min read
Integrating Spring Security with Spring Boot for JWT Authentication and Authorization
Code Ape Tech Column
Code Ape Tech Column
May 27, 2025 · Information Security

Combining JWT and Session for Secure and Scalable User Authentication

This article explains how JWT provides stateless authentication while Session adds an extra security layer and lifecycle management, and demonstrates their combined use with Java code to achieve both scalability and fine‑grained control over user sessions.

AuthenticationJWTJava
0 likes · 8 min read
Combining JWT and Session for Secure and Scalable User Authentication
IT Services Circle
IT Services Circle
May 15, 2025 · Information Security

Critical RDP Vulnerability Allows Persistent Access with Revoked Microsoft/Azure Passwords

A newly disclosed critical vulnerability in Windows Remote Desktop Protocol (RDP) lets attackers bypass cloud authentication and maintain permanent access using revoked Microsoft or Azure account passwords, even after password changes, while Microsoft treats the issue as a design decision rather than a bug.

AuthenticationAzureMicrosoft
0 likes · 5 min read
Critical RDP Vulnerability Allows Persistent Access with Revoked Microsoft/Azure Passwords
Top Architect
Top Architect
May 7, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, token encryption, secure storage, expiration policies, two‑factor authentication and safe token refresh mechanisms.

AuthenticationJWTWeb Development
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Code Mala Tang
Code Mala Tang
Apr 29, 2025 · Backend Development

Master FastAPI Middleware: From Built‑in to Custom Auth and Logging

This guide explains how FastAPI middleware works, outlines its request‑response lifecycle, shows built‑in examples like CORS and HTTPS redirect, and demonstrates how to create custom middleware for logging, authentication, and other cross‑cutting concerns.

AuthenticationPythonbackend
0 likes · 6 min read
Master FastAPI Middleware: From Built‑in to Custom Auth and Logging
Raymond Ops
Raymond Ops
Apr 24, 2025 · Cloud Native

Mastering Istio Security: Complete Guide to Mutual TLS, Authentication, and Authorization

This article explains how Istio secures micro‑service architectures by providing strong identity, fine‑grained access policies, transparent TLS encryption, and comprehensive AAA (authentication, authorization, audit) mechanisms, covering high‑level architecture, certificate management, peer and request authentication, and authorization policy design.

AuthenticationAuthorizationIstio
0 likes · 23 min read
Mastering Istio Security: Complete Guide to Mutual TLS, Authentication, and Authorization
Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

AuthenticationHTTPSJWT
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Top Architect
Top Architect
Apr 17, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention

This article presents a comprehensive design for securing third‑party APIs by using Access Key/Secret Key pairs, timestamp and nonce validation, signature generation, token handling, HTTPS, rate limiting, logging, idempotency, versioning, standardized response formats and practical Java code examples to prevent tampering and replay attacks.

API securityAuthenticationReplay Attack
0 likes · 32 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention
php中文网 Courses
php中文网 Courses
Apr 17, 2025 · Backend Development

Using PHP LDAP Functions for Connecting, Binding, and User Authentication

This tutorial explains how to use PHP's LDAP functions to connect to an LDAP server, bind a user, and authenticate credentials, providing complete example code for each step to enable secure authentication in web applications.

AuthenticationPHPbackend
0 likes · 4 min read
Using PHP LDAP Functions for Connecting, Binding, and User Authentication
php中文网 Courses
php中文网 Courses
Apr 14, 2025 · Backend Development

Using PHP LDAP Functions for Connecting, Binding, and Authenticating Users

This article explains how to use PHP's LDAP functions to connect to an LDAP server, bind an account, and authenticate users, providing clear code examples for each step in a typical web application authentication workflow.

AuthenticationDirectory ServicesPHP
0 likes · 4 min read
Using PHP LDAP Functions for Connecting, Binding, and Authenticating Users
php中文网 Courses
php中文网 Courses
Apr 14, 2025 · Backend Development

PHP Session Management: Using session_start, Controlling Lifetime, and Destroying Sessions

This article explains how to use PHP's session_start function to initiate sessions, manage session data with $_SESSION, control session lifetime via session_set_cookie_params, and properly destroy sessions with session_destroy, providing clear code examples for each step.

AuthenticationBackend DevelopmentSession Management
0 likes · 5 min read
PHP Session Management: Using session_start, Controlling Lifetime, and Destroying Sessions
Aikesheng Open Source Community
Aikesheng Open Source Community
Apr 10, 2025 · Information Security

Securing MySQL Connections: SSL/TLS, Password Plugins, and Authentication

This article explains how to protect MySQL connections by using SSL/TLS, various password authentication plugins, digital signatures, and client/server certificate verification to prevent impersonation, password leakage, and data tampering.

AuthenticationMySQLPassword Plugin
0 likes · 11 min read
Securing MySQL Connections: SSL/TLS, Password Plugins, and Authentication
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Apr 10, 2025 · Backend Development

From Frontend Lightning Strike to Full‑Stack Node.js Backend: A Story and Implementation Guide

This article narrates a dramatic front‑end takeover during a high‑traffic promotion, then provides a step‑by‑step guide to building a Node.js backend service with Express, MongoDB, JWT authentication, and deployment considerations, illustrating performance trade‑offs between Java and Node.js.

API GatewayAuthenticationBackend Development
0 likes · 16 min read
From Frontend Lightning Strike to Full‑Stack Node.js Backend: A Story and Implementation Guide
Selected Java Interview Questions
Selected Java Interview Questions
Apr 8, 2025 · Backend Development

Authentication Implementation: Choosing Between JWT and Session in Backend Development

This article explains the technical selection between JWT and session for authentication, compares their differences, advantages, and disadvantages, and provides a complete Java implementation—including token generation, Redis storage, login/logout, password update, and request interception—demonstrating why JWT was chosen for a distributed backend system.

AuthenticationJWTJava
0 likes · 13 min read
Authentication Implementation: Choosing Between JWT and Session in Backend Development
Architect
Architect
Apr 6, 2025 · Information Security

Technical Selection and Implementation of Authentication: JWT vs Session

This article compares JWT and session-based authentication, detailing their differences, certification processes, advantages, disadvantages, security considerations, performance impacts, token renewal, and revocation strategies, and provides a complete Java implementation using Spring, Redis, and custom utility classes.

AuthenticationJWTJava
0 likes · 12 min read
Technical Selection and Implementation of Authentication: JWT vs Session
Code Mala Tang
Code Mala Tang
Apr 5, 2025 · Information Security

Secure FastAPI APIs with JWT: Step‑by‑Step Authentication & Role‑Based Authorization

Learn how to implement stateless JWT authentication and role‑based authorization in FastAPI, covering token structure, installation of PyJWT, creating login and protected endpoints, custom dependencies, and testing via Swagger UI, while highlighting security benefits and best practices for robust backend APIs.

AuthenticationAuthorizationJWT
0 likes · 11 min read
Secure FastAPI APIs with JWT: Step‑by‑Step Authentication & Role‑Based Authorization
Selected Java Interview Questions
Selected Java Interview Questions
Apr 1, 2025 · Information Security

Understanding QR Code Login: Principles, Token Authentication, and Implementation Steps

This article explains the fundamentals of QR code login, detailing how QR codes work, the token‑based authentication mechanism, and the step‑by‑step process—including QR code generation, scanning, temporary token exchange, and final confirmation—that enables secure cross‑device login without exposing passwords.

AuthenticationQR codelogin
0 likes · 12 min read
Understanding QR Code Login: Principles, Token Authentication, and Implementation Steps
Architect's Guide
Architect's Guide
Mar 31, 2025 · Information Security

Design and Security Practices for Third‑Party API Authentication and Signing

This article presents a comprehensive design scheme for third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, secure API endpoint design, anti‑replay mechanisms, token handling, TLS encryption, database schema, and implementation examples in Java.

API securityAuthenticationJava
0 likes · 30 min read
Design and Security Practices for Third‑Party API Authentication and Signing