O'Reilly logo

Microservices in .NET Core: with examples in Nancy by Christian Horsdal Gammelgaard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Securing microservice-to-microservice communication

This chapter covers

  • Determining where to perform user authentication and authorization in a microservice system
  • Deciding on the level of trust in your microservice system
  • Using IdentityServer to authenticate users
  • Authorizing microservice-to-microservice requests

Up to this point in the book, we’ve ignored security; but for most systems, security is an important concern that needs careful attention. This chapter discusses how to address security concerns in a microservice system. In a monolith, the monolith does user authentication and authorization—there is, after all, only the monolith to do those things. In a microservice system, several microservices are involved in answering ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required