排序
Advanced OAuth2: Refresh Tokens and Token Expiration Strategies
Advanced OAuth2: Refresh Tokens and Token Expiration Strategies, Master advanced OAuth2 strategies: refresh tokens, token expiration, and Spring Boot examples to secure your applic...
Open Authorization v2.0 OAuth2 mikro servislar xavfsizligi
Open Authorization v2.0 OAuth2 mikro servislar xavfsizligi, So'z boshi Mikroservislardan iborat API-ni taqdim qilishda e'tiborga olish kerak bo'lgan eng muhim jihatlardan biri bu x...
Python FastAPI: Integrating OAuth2 Security with the Application’s Own Authentication Process
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process,In the first post, we explore some aspects of OAuth2 authentication, focusing on the /...
Authentification Oauth2 avec OpenFeign
Authentification Oauth2 avec OpenFeign, Contexte OpenFeign est une libraire du projet Spring Cloud permettant de développer des clients HTTP de manière déclarative. Note : Sprin...
Spring Cloud Gateway Combined with the Security Practice of OAuth2.0 Protocol
Spring Cloud Gateway Combined with the Security Practice of OAuth2.0 Protocol, Overview Spring Cloud Gateway is an API Gateway built on top of the Spring ecosystem. It is built on ...
Spring Security and OpenID Connect
Spring Security and OpenID Connect, Overview OpenID Connect is an open standard published by the OpenID Foundation in February 2014. It defines an interworking way to perform user ...
Spring Security OAuth2 Login
Spring Security OAuth2 Login, Overview OAuth 2.0 is not an authentication protocol. What is identity authentication? Authentication is the solution to the 'Who are you?'. Authentic...
Authorization Code Flow with Proof Key for Code Exchange (PKCE)
Authorization Code Flow with Proof Key for Code Exchange (PKCE), Overview OAuth2 divides clients into two types according to whether they can hold the client key: public clients an...
Spring Security OAuth2 Client Credentials Grant
Spring Security OAuth2 Client Credentials Grant, Overview What to do when there is no clear resource owner, or the resource owner is indistinguishable to the client? This is a fair...
Spring Security Persistent OAuth2 Client
Spring Security Persistent OAuth2 Client,In previous article, it is introduced that the client requests authorization from the authorization server (using Spring Authorization Serv...
Customize the OAuth2 Authorization Consent Page
Customize the OAuth2 Authorization Consent Page,In the previous article, we have briefly introduced how to build an authorization server. Next, we will continue to introduce how to...
Using JWT with Spring Security OAuth2
Using JWT with Spring Security OAuth2, Overview OAuth 2.0 is the industry standard authorization protocol. OAuth 2.0 focuses on simplicity for client developers, while providing sp...