-
Book Overview & Buying
-
Table Of Contents
Spring System Design in Practice
By :
Welcome to Chapter 8! In this chapter, we will discuss important aspects of user authentication and authorization. There is a world of things we could do in Spring to secure our services, but we will take just a key approach here that is widely used today: the combination of OAuth 2.0 and JWT tokens.
Here are the topics we’ll cover:
We will start by taking a strategic view of the possible vulnerabilities a typical microservice architecture brings. Then, we will proceed by discussing OAuth 2.0 and different ways of providing authentication and authorization. We will also dive deep into the structure of JWTs and how signatures are made. Finally, we will implement these concepts by writing a sample authorization...