Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Secure Microservices: API Keys, Access Tokens, and Signed JWTs

DZone's Guide to

Secure Microservices: API Keys, Access Tokens, and Signed JWTs

Check out these three awesome examples that illustrate how secure microservices are essential, and documentation on securing microservices can be a bit Dickensian.

· Integration Zone ·
Free Resource

Continue to drive demand for API management solutions that address the entire API life cycle and bridge the gap to microservices adoption.  

I believe these two things are true:

  1. It is very important to secure your microservices
  2. It can be difficult to read documentation trying to explain how to secure your microservices

We’ve built three samples for you, which we hope will be easy to read, and will teach you something new.

Using API keys to secure your microservice is Adam’s sample. He explains what API keys are, where they come from, and how they’re used.

Using access tokens to secure microservices is the first of two from Ozzy. He explains how the access tokens created as a result of working with OAuth and OpenID Connect work and are used within a microservices architecture.

Using signed JSON Web Tokens (JWTs) to secure microservices builds on the previous article to explain how to use Signed JWTs to propagate identity instead of access tokens.

All sample code is available in GitHub. Go play!

Discover how organizations are modernizing their application architectures for speed and agility from the growing API economy

Topics:
authentication ,authorization ,security ,integration ,microservices ,ei ,enterprise integration

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}