Secure Microservices: API Keys, Access Tokens, and Signed JWTs
Check out these three awesome examples that illustrate how secure microservices are essential, and documentation on securing microservices can be a bit Dickensian.
Join the DZone community and get the full member experience.Join For Free
I believe these two things are true:
- It is very important to secure your microservices
- It can be difficult to read documentation trying to explain how to secure your microservices
We’ve built three samples for you, which we hope will be easy to read, and will teach you something new.
Using access tokens to secure microservices is the first of two from Ozzy. He explains how the access tokens created as a result of working with OAuth and OpenID Connect work and are used within a microservices architecture.
Using signed JSON Web Tokens (JWTs) to secure microservices builds on the previous article to explain how to use Signed JWTs to propagate identity instead of access tokens.
All sample code is available in GitHub. Go play!
Published at DZone with permission of Erin Schnabel, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.