Tips for High-Scale MQTT Messaging with EMQ

Tips for High-Scale MQTT Messaging with EMQ

If the number of devices reaches one million, the database will have to handle two million authentication records, which will significantly affect the database’s performance. Is there a batch way to define ACL authentication? 1. ACL Authentication Rules Under normal business usage, the behavior of clients can be restricted using ACL. For example, Client A … Read more

Analysis of Rails 8 Authentication Implementation (1) – Theoretical Preparation

Analysis of Rails 8 Authentication Implementation (1) - Theoretical Preparation

Ten days ago, 37signals published an article: A vanilla Rails stack is plenty, this article reinforced my long-standing belief: If Rails provides a solution, it’s best to stick with Rails’ solution. Maintaining minimal dependencies and reducing upgrade barriers is certainly important; more importantly, it is to learn the “optimal solution” after top developers think and … Read more

Understanding User Authentication in Web Applications

Understanding User Authentication in Web Applications

https://thecopenhagenbook.com/ Server-side tokens A server-side token is any long, random string that is stored on the server. It may be persisted in a database or in-memory data store (e.g. Redis) and is used for authentication and verification. A token can be validated by checking if it exists in storage. Examples include session IDs, email verification … Read more