Web - OAuth2 authentication process

The difference between a token and a password Tokens and password s work the same way and can enter the system, but there are several main differences: tokenPasswordEffective durationAutomatic expiration of tokensLong-term validity without user modificationWho can revokeData owner revocation invalidatesCancellation is not generally allowedPer ...

Posted by wutanggrenade on Thu, 03 Mar 2022 19:06:40 +0100

Spring security implements oauth2 0 - separation of authorization service and resource service

How to build OAuth2.0_01_basic edition authorization service by spring security and advanced edition authorization service by spring security are introduced in two articles 0 authorization server and resource server. This article will continue to optimize, separate the authorization server and resource server, and deploy them on different serv ...

Posted by will35010 on Tue, 15 Feb 2022 09:30:13 +0100

Microservice architecture | 7.1 security authentication based on OAuth2

preface <Spring Microservices in Action> Principle and practice of Spring Cloud Alibaba microservice "Spring cloud framework development tutorial in Silicon Valley of station B" Zhou Yang OAuth2 is a token based security authentication and authorization framework. It allows users to authenticate using third-party authenticati ...

Posted by petrb on Thu, 03 Feb 2022 06:29:38 +0100

From 0 to 1, build spring cloud alibaba micro service large application framework (Mini cloud) and build authentication service (authentication / resource separation version) oauth2 0 (medium)

This paper follows the above Build spring cloud alibaba microservice large application framework from 0 to 1 (III) (Mini cloud) build authentication service (authentication / resource separation version) oauth2.0 (Part I) It still introduces the construction details of the certification center 1. Process introduction The overall process is ...

Posted by vponz on Wed, 26 Jan 2022 18:37:40 +0100

Take you hand in hand to realize the login of third-party applications

Have you ever thought about implementing a third-party application login when you are doing your own project? Like this: This article will talk about how to realize third-party application login. What is oauth2 0 OAuth is a protocol, which provides a safe, open and simple standard for the authorization of user resources. OAuth authorization ...

Posted by wtech on Thu, 06 Jan 2022 02:13:45 +0100

Spring OAuth2 Development Guide: OAuth2 password pattern development example

Spring OAuth2 Development Guide (II): OAuth2 password pattern development example 1, Opening This is the second article in the Spring OAuth2 Development Guide series. It introduces the development details of OAuth2 password mode through code examples. There are many and messy code demonstrations about OAuth2 development on the network, wh ...

Posted by Pellefant on Mon, 03 Jan 2022 20:49:38 +0100

User must be authenticated with Spring Security before authorization can be completed

Problem description When using Spring cloud oauth2 to implement Oauth 2 permission control, call / oauth/authorize to obtain the authorization code, and throw the User must be authenticated with Spring Security before authorization can be completed exception? Request interface: The console exception information is:   The source code of t ...

Posted by duk on Sat, 25 Dec 2021 17:13:16 +0100

Quick Start and Use of JWT

Use of JWT(JSON Web Token) Preface This post is correct shiro uses JWT Complete complementary extensions to provide full sample code for detailed use in JWT. If there is a discrepancy between your understanding of RSA and your own reading of this blog, please read the part of this blog explaining RSA. If there are other inconsistencies a ...

Posted by tinker on Wed, 01 Dec 2021 21:06:32 +0100