10月
Security design for token authenticates

This article describes how to choose appreciated tokens in security design.

07月
Design a Fine-grained Authorization System with RBAC and ACL

Implementing flexible, fine-grained permission management is an essential component of robust software design. This article will walk through various authorization system designs that aim to achieve that goal.

06月
Mask sensitive data with custom jackson annotations

In this article, we’ll see how to use custom jackson annotations to mask sensitive data with asterisk.