In this chapter, we've shown how you can use distributed security protocols to secure your cloud applications using our practical example.
We started this chapter by introducing concepts based on distributed authentication and authorization: the rationale for tokens and how they can be obtained and used. Later, we introduced basic information about a concrete distributed security protocol: OpenID Connect.
In the practical section, we used the Keycloak SSO server to secure the cart service in the Petstore application.
In the, we will discuss how do deal with an unreliable network problem using a circuit breaker pattern; specifically, the Hystrix library.