Secure Microservices: API Keys, Access Tokens, and Signed JWTs

DZone 's Guide to

Secure Microservices: API Keys, Access Tokens, and Signed JWTs

Check out these three awesome examples that illustrate how secure microservices are essential, and documentation on securing microservices can be a bit Dickensian.

· Integration Zone ·
Free Resource

I believe these two things are true:

  1. It is very important to secure your microservices
  2. It can be difficult to read documentation trying to explain how to secure your microservices

We’ve built three samples for you, which we hope will be easy to read, and will teach you something new.

Using API keys to secure your microservice is Adam’s sample. He explains what API keys are, where they come from, and how they’re used.

Using access tokens to secure microservices is the first of two from Ozzy. He explains how the access tokens created as a result of working with OAuth and OpenID Connect work and are used within a microservices architecture.

Using signed JSON Web Tokens (JWTs) to secure microservices builds on the previous article to explain how to use Signed JWTs to propagate identity instead of access tokens.

All sample code is available in GitHub. Go play!

authentication, authorization, ei, enterprise integration, integration, microservices, security

Published at DZone with permission of Erin Schnabel , DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}