September 2018
Intermediate to advanced
412 pages
11h 12m
English
Since microservices at the IoT scale can generate a huge amount of load, it is essential we use best practices to handle security. As we have seen in the chapter on security, we typically use OAuth to handle authentication and authorization between the services, and in typical use cases the user gets authenticated using a UAA, which generates a JWT token for subsequent calls to the services. But this JWT token needs to be validated by each of the microservices. This can generate lots of traffic to the UAA service. Alternatively, we can use a Client Credential Grant, as will be detailed in this section, to establish trust between the microservices.
The Client Credentials Grant ...