Book Image

Building Microservices with Micronaut®

By : Nirmal Singh, Zack Dawood
Book Image

Building Microservices with Micronaut®

By: Nirmal Singh, Zack Dawood

Overview of this book

The open source Micronaut® framework is a JVM-based toolkit designed to create microservices quickly and easily. This book will help full-stack and Java developers build modular, high-performing, and reactive microservice-based apps using the Micronaut framework. You'll start by building microservices and learning about the core components, such as ahead-of-time compilation, reflection-less dependency injection, and reactive baked-in HTTP clients and servers. Next, you will work on a real-time microservice application and learn how to integrate Micronaut projects with different kinds of relational and non-relational databases. You'll also learn how to employ different security mechanisms to safeguard your microservices and integrate microservices using event-driven architecture in the Apache Kafka ecosystem. As you advance, you'll get to grips with automated testing and popular testing tools. The book will help you understand how you can easily handle microservice concerns in Micronaut projects, such as service discovery, API documentation, distributed configuration management, fallbacks, and circuit breakers. Finally, you'll explore the deployment and maintenance aspects of microservices and get up to speed with the Internet of Things (IoT) using the Framework. By the end of this book, you'll be able to build, test, deploy, and maintain your own microservice apps using the framework.
Table of Contents (20 chapters)
1
Section 1: Core Concepts and Basics
3
Section 2: Microservices Development
8
Section 3: Microservices Testing
10
Section 4: Microservices Deployment
13
Section 5: Microservices Maintenance
15
Section 6: IoT with Micronaut and Closure

Using OAuth to secure service endpoints

OAuth is yet another token-based authentication strategy. Its wide acceptability, good coverage of the depth and breadth of web security concerns, and the flexibility of managing user sessions at both the client and server side make it an enterprise-grade authentication mechanism. OAuth dictates to use the token to establish the identity instead of passing usernames and passwords. A token can be obtained from an external identity provider and this token can then be passed to any subsequent requests to resume a session:

Figure 4.15 – Separating the concerns with OAuth

As shown in the preceding figure, in the OAuth token-based authentication strategy, the client obtains a token from the identity provider and uses this token in any API requests to the server. The server validates this token with the identity provider to return a proper response.

To learn how to secure a microservice using an OAuth and cloud-based...