Over a million developers have joined DZone.

Secure Microservices: API Keys, Access Tokens, and Signed JWTs

DZone's Guide to

Secure Microservices: API Keys, Access Tokens, and Signed JWTs

Check out these three awesome examples that illustrate how secure microservices are essential, and documentation on securing microservices can be a bit Dickensian.

· Integration Zone ·
Free Resource

How to Transform Your Business in the Digital Age: Learn how organizations are re-architecting their integration strategy with data-driven app integration for true digital transformation.

I believe these two things are true:

  1. It is very important to secure your microservices
  2. It can be difficult to read documentation trying to explain how to secure your microservices

We’ve built three samples for you, which we hope will be easy to read, and will teach you something new.

Using API keys to secure your microservice is Adam’s sample. He explains what API keys are, where they come from, and how they’re used.

Using access tokens to secure microservices is the first of two from Ozzy. He explains how the access tokens created as a result of working with OAuth and OpenID Connect work and are used within a microservices architecture.

Using signed JSON Web Tokens (JWTs) to secure microservices builds on the previous article to explain how to use Signed JWTs to propagate identity instead of access tokens.

All sample code is available in GitHub. Go play!

Make your mark on the industry’s leading annual report. Fill out the State of API Integration 2019 Survey and receive $25 to the Cloud Elements store.

authentication ,authorization ,security ,integration ,microservices ,ei ,enterprise integration

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}