Tag

token

1 views collected around this technical thread.

Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Apr 27, 2025 · Backend Development

Implementing MCP over SSE/HTTP in a SpringBoot Backend

This article explains how to extend an open‑source smart production management system with MCP support by creating SSE/HTTP endpoints, a token‑based MAP, and a McpService that scans, executes, and pushes results, and demonstrates client configuration using CherryStudio.

MCPSSESpringBoot
0 likes · 6 min read
Implementing MCP over SSE/HTTP in a SpringBoot Backend
Top Architect
Top Architect
Apr 17, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention

This article presents a comprehensive design for securing third‑party APIs by using Access Key/Secret Key pairs, timestamp and nonce validation, signature generation, token handling, HTTPS, rate limiting, logging, idempotency, versioning, standardized response formats and practical Java code examples to prevent tampering and replay attacks.

API securityAuthenticationReplay Attack
0 likes · 32 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention
php中文网 Courses
php中文网 Courses
Apr 10, 2025 · Backend Development

Implementing Debounce and Preventing Duplicate Submissions in PHP

This article explains how to implement debounce functionality and prevent duplicate form submissions in PHP using session storage, providing step‑by‑step code examples for creating a debounce helper, generating and validating tokens, and integrating them into web forms.

DebouncePHPWeb Development
0 likes · 5 min read
Implementing Debounce and Preventing Duplicate Submissions in PHP
Selected Java Interview Questions
Selected Java Interview Questions
Apr 8, 2025 · Backend Development

Authentication Implementation: Choosing Between JWT and Session in Backend Development

This article explains the technical selection between JWT and session for authentication, compares their differences, advantages, and disadvantages, and provides a complete Java implementation—including token generation, Redis storage, login/logout, password update, and request interception—demonstrating why JWT was chosen for a distributed backend system.

AuthenticationJWTJava
0 likes · 13 min read
Authentication Implementation: Choosing Between JWT and Session in Backend Development
php中文网 Courses
php中文网 Courses
Apr 3, 2025 · Information Security

How to Defend Against CSRF Attacks Using PHP

This article explains the fundamentals of CSRF attacks, how they exploit authenticated users' cookies, and provides practical PHP techniques—including token generation and verification, request‑origin checks, secure cookie settings, and safe login/logout handling—to effectively protect web applications.

CSRFPHPWeb Security
0 likes · 6 min read
How to Defend Against CSRF Attacks Using PHP
Selected Java Interview Questions
Selected Java Interview Questions
Apr 1, 2025 · Information Security

Understanding QR Code Login: Principles, Token Authentication, and Implementation Steps

This article explains the fundamentals of QR code login, detailing how QR codes work, the token‑based authentication mechanism, and the step‑by‑step process—including QR code generation, scanning, temporary token exchange, and final confirmation—that enables secure cross‑device login without exposing passwords.

AuthenticationQR codeSecurity
0 likes · 12 min read
Understanding QR Code Login: Principles, Token Authentication, and Implementation Steps
Architecture Digest
Architecture Digest
Mar 25, 2025 · Information Security

Understanding QR Code Login: Principles, Token Authentication, and Implementation Steps

This article explains the fundamentals of QR code login, detailing how QR codes convey unique IDs, the token‑based authentication process, the steps from QR generation to device verification, and the security considerations involved in implementing scan‑to‑login across web and mobile platforms.

AuthenticationQR codeSecurity
0 likes · 11 min read
Understanding QR Code Login: Principles, Token Authentication, and Implementation Steps
Test Development Learning Exchange
Test Development Learning Exchange
Mar 21, 2025 · Information Security

Practical Session and Token Authentication with Python Requests

This article demonstrates practical implementations of session-based and token-based authentication, including JWT and a dual-token (access and refresh) mechanism, using Python's requests library, and explains how to obtain, use, and refresh tokens for protected API endpoints in automated testing.

APIAuthenticationSecurity
0 likes · 6 min read
Practical Session and Token Authentication with Python Requests
Code Ape Tech Column
Code Ape Tech Column
Feb 27, 2025 · Information Security

Implementing Single Sign-On (SSO) with Ticket‑Based Authentication in Java

This article explains the concept of Single Sign-On, its advantages, and two practical implementations using ticket‑based authentication and encrypted user data exchange between Service A and Service B, complete with database schema, configuration files, and full Java code examples.

AuthenticationJavaSSO
0 likes · 18 min read
Implementing Single Sign-On (SSO) with Ticket‑Based Authentication in Java
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Feb 27, 2025 · Frontend Development

Token Silent Refresh in Frontend Development: Concepts, Strategies, and Implementation

This article explains the fundamentals of token‑based authentication, the drawbacks of fixed token lifetimes, and presents multiple silent‑refresh techniques—including double‑token mechanisms, front‑end timers, server‑side proactive refresh, and concurrency‑safe lock strategies—along with practical code examples and performance considerations for high‑concurrency scenarios.

AuthenticationAxiosJWT
0 likes · 15 min read
Token Silent Refresh in Frontend Development: Concepts, Strategies, and Implementation
Linux Ops Smart Journey
Linux Ops Smart Journey
Feb 25, 2025 · Cloud Native

How to Retrieve ServiceAccount Tokens in Kubernetes 1.24+ Without Legacy Secrets

Starting with Kubernetes 1.24, automatic ServiceAccount token Secrets are deprecated; this guide explains the core changes, shows how to manually create token Secrets, extract tokens, and verify permissions using command‑line, API calls, and RBAC inspection, plus common troubleshooting steps.

KubernetesRBACServiceAccount
0 likes · 5 min read
How to Retrieve ServiceAccount Tokens in Kubernetes 1.24+ Without Legacy Secrets
Top Architect
Top Architect
Feb 15, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Mechanisms

The article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, defining permission scopes, implementing signature generation and verification, employing timestamps and nonces to prevent replay attacks, and outlining practical API endpoint specifications and response standards.

API securityAuthenticationJava
0 likes · 33 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Mechanisms
Lobster Programming
Lobster Programming
Jan 23, 2025 · Backend Development

How to Implement Secure Auto‑Login with Cookie + Token in Java Spring

This guide explains how to create a seamless auto‑login feature by persisting a token in a cookie after the first successful login, storing the token in Redis, and validating it on subsequent visits, complete with Java Spring code examples.

Auto LoginJavaRedis
0 likes · 5 min read
How to Implement Secure Auto‑Login with Cookie + Token in Java Spring
Top Architect
Top Architect
Jan 22, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management

This article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, defining permission granularity, implementing signature generation with timestamps and nonces, handling token lifecycle, and providing concrete Java and SQL code examples for practical deployment.

AK/SKAPI securityAuthentication
0 likes · 31 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management
Lobster Programming
Lobster Programming
Jan 9, 2025 · Information Security

5 Effective Anti-Hotlinking Techniques: Nginx, SpringBoot, Tokens, Timestamps & Captchas

Hotlinking attacks steal popular media by fetching resources from major platforms, but developers can protect assets using anti-leech methods such as Nginx referer checks, SpringBoot filters, token validation, timestamp verification, and graphical captchas, each with strengths and limitations against forged requests.

NginxSpringBootanti-hotlinking
0 likes · 7 min read
5 Effective Anti-Hotlinking Techniques: Nginx, SpringBoot, Tokens, Timestamps & Captchas
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 24, 2024 · Backend Development

Preventing Duplicate Order Submissions with Token Mechanism and Redis in Spring Boot

This article explains how to prevent duplicate order submissions in e‑commerce systems by using a token mechanism and Redis‑based distributed locks within a Spring Boot backend, detailing the workflow, code implementation, and best‑practice optimizations for idempotent processing.

IdempotencyRedisSpring Boot
0 likes · 11 min read
Preventing Duplicate Order Submissions with Token Mechanism and Redis in Spring Boot
Top Architect
Top Architect
Dec 17, 2024 · Information Security

Design and Security Practices for Third‑Party API Authentication and Authorization

This article presents a comprehensive design scheme for third‑party API interfaces, covering access‑key/secret‑key generation, permission segmentation, signature flow and rules, anti‑replay mechanisms, token handling, and concrete Java code examples for secure request validation.

API securitySignatureaccess key
0 likes · 29 min read
Design and Security Practices for Third‑Party API Authentication and Authorization
Architect's Guide
Architect's Guide
Dec 16, 2024 · Information Security

Understanding the Mechanics of QR Code Login and Token‑Based Authentication

This article explains how QR code login works by describing QR code fundamentals, token‑based authentication, and the step‑by‑step process—including QR generation, scanning, state transitions, and final confirmation—that enables a mobile device to securely authenticate a PC session.

AuthenticationMobileQR code
0 likes · 11 min read
Understanding the Mechanics of QR Code Login and Token‑Based Authentication
Top Architect
Top Architect
Dec 6, 2024 · Information Security

Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens

This article presents a comprehensive design for securing third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, anti‑replay mechanisms, token handling, detailed API endpoint specifications, and best‑practice security measures with illustrative Java code examples.

AK/SKAPI securityAuthentication
0 likes · 32 min read
Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens
Architect
Architect
Nov 21, 2024 · Information Security

Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth

This article reviews four widely used authentication mechanisms—HTTP Basic Authentication, session‑cookie, token‑based verification (including JWT), and OAuth—explaining their workflows, security characteristics, implementation details with Node.js/Express code samples, and comparative advantages for different application scenarios.

AuthenticationHTTP BasicNode.js
0 likes · 18 min read
Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth