Learn about authentication methods for web apps and related best practices.
Also find me here:
Baeldung Author
Sandip Roy
My area of specialization is Emerging Platforms and Services, IT Managed Service (SAAS, PAAS, IAAS), digital communication, and computer and IT technology fundamentals. The special focus is on the integration of technologies such as Bioinformatics, Artificial Intelligence (ML, DL), Location & Mobility with modern-day devices and applications.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Networking (12)
- Security (10)
- OS (4)
- Programming (2)
- Concurrency (2)
- Web (1)
- Software Architecture (1)
- Core Concepts (1)
How Do ID Tokens Work?
Filed under Networking, Security
Learn about the advantages and shortcomings of ID tokens and how to implement them.
What Are Access and Refresh Tokens?
Filed under Networking
Explore access and refresh tokens and learn how to implement them.
Security: a Brief Review of Claims-Based Authentication
Filed under Networking, Security
Explore the concept of claims-based authentication.
Pre-master Secret vs. Master Secret vs. Private Key vs. Shared Secret
Filed under Security
Learn how secrets and keys work in an SSL/TLS handshake.
URL Matrix Parameters vs Query Parameters
Filed under Networking, Security
Learn the difference between query and matrix parameters of an URL.
CORS, CSP, and Their Differences
Filed under Networking, Security
Explore CORS and CSP.
User Thread vs Kernel Threads
Filed under OS, Programming
Explore differences between user and kernel threads.
How to Overcome Root Domain CNAME Restrictions?
Filed under Networking
Learn about various types of DNS records and how to overcome root domain CNAME restrictions.
How Do Threads Share Resources?
Filed under Concurrency, OS
Learn what resources threads share.
Single-Threaded vs Multiple-Threaded Apartments in COM
Filed under Concurrency
Explore the differences between STA and MTA threading models.
Using HTTP Tunnel to Traceroute Through a Proxy With Firewall
Filed under Networking
A guide to using HTTP tunnel to traceroute through a proxy with firewall.
How to Find the Authoritative Name Server for a Domain?
Filed under Networking
Learn how to find the authoritative name server of a domain.
What Sets the RST Flag?
Filed under Networking, Security
Learn what sets the Reset flag in the TCP/IP protocol.
Maximum Packet Size for a TCP Connection
Filed under Networking
Learn how TCP connection works and why the maximum packet size is important.
The Difference Between a Framework and a Library
Filed under Core Concepts
Learn the difference between frameworks and libraries.
Protocols Used for PING
Filed under Security
In this tutorial, we’ll try to explain the protocols used by ping and explore various aspects of them.
Runtime vs. Compile Time
Filed under Programming, Software Architecture
In this tutorial, we’ll explain the concepts behind Compile-time and Runtime and explore various aspects of them.
Routers vs. Switches vs. Access Points
Filed under Networking, Security
Learn some of the differences between common devices such as modems, routers, switches, and access points
What Is a Chipset?
Filed under OS
Let’s have a closer look at chipsets, and understand their components.
BIOS vs. CMOS vs. UEFI
Filed under OS
Learn about the BIOS, CMOS, UEFI and the differences between them.
Authentication vs Authorization
Filed under Networking, Security
Learn the difference between Authentication and Authorization.