Authentication and Authorization in Microservices

Defense in Depth (DID):

Defense in Depth

Multiple layers of Security

1. Encryption

2. Network

3. Monitoring

Authenticating End Users

End User Login process

Problems with Basic Authentication

Using an Authorization Server

OAuth 2.0

OpenID Connect

Authentication Between MicroServices

Authorization in Microservices

Summary

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store