DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Curious about the future of data-driven systems? Join our Data Engineering roundtable and learn how to build scalable data platforms.

Data Engineering: The industry has come a long way from organizing unstructured data to adopting today's modern data pipelines. See how.

Threat Detection: Learn core practices for managing security risks and vulnerabilities in your organization — don't regret those threats!

Managing API integrations: Assess your use case and needs — plus learn patterns for the design, build, and maintenance of your integrations.

Avatar

Taner Inal

Expert Software Engineer at Turkcell Technology

Joined Jun 2021

Stats

Reputation: 253
Pageviews: 49.3K
Articles: 6
Comments: 3
  • Articles
  • Comments

Articles

article thumbnail
Providing Enum Consistency Between Application and Data
Discussing and demonstrating the Spring Boot application of a solution for providing enum consistency between running the application code and data itself.
December 28, 2022
· 5,345 Views · 1 Like
article thumbnail
Data Model Tracing and Reporting on a Relational Database
Construct a data model catalog in a relational database and a mechanism that monitors and reports the changes related to this data model and catalog content.
July 29, 2022
· 5,874 Views · 1 Like
article thumbnail
How to Use JWT Securely
Ideas and sample implementations about generation/validation logics and login/logout procedures for secure JWT usage within a Java project.
March 20, 2022
· 7,113 Views · 5 Likes
article thumbnail
Migration of Microservice Applications From WebLogic to Openshift
Learn from our experiences with seamless migration of Spring Boot microservices from WebLogic to OpenShift and practices for parallel running on both platforms.
January 27, 2022
· 3,706 Views · 4 Likes
article thumbnail
Authentication With Remote LDAP Server in Spring WebFlux
A guide for Java developers who want to integrate Spring Boot Webflux applications with a remote LDAP server and authenticate/authorize their users with JWT.
Updated January 16, 2022
· 10,729 Views · 8 Likes
article thumbnail
Authentication With Remote LDAP Server in Spring Web MVC
A guide for Java developers who want to integrate Spring Boot MVC applications with a remote LDAP server and authenticate/authorize their users with JWT.
Updated January 15, 2022
· 16,529 Views · 8 Likes

Comments

Split the Monolith: What, When, How

Apr 20, 2022 · Igor Azarny

Hi Igor, thanks for this extensive article. A humble advice; Please place the expansions of the abbreviations you use in your article at least once.

How to Use JWT Securely

Mar 30, 2022 · Taner Inal

I'll be very happy if I can make things clear. Please refer to "Usability Check" section for the main purpose of persisting an active/passive flag for a token. Setting expiration time claim and persisting active/passive flag are complementary precautions.

How to Use JWT Securely

Mar 30, 2022 · Taner Inal

Hi Gabriel, thanks for your comment. Since JWT "itself" is not revocable, we are supporting it with a flag stored in database.

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: