July 2017
Beginner to intermediate
340 pages
7h 43m
English
Our first step to building the authentication microservice will be to implement everything needed to perform a CCG flow. For that flow, the app receives requests from services that want a token and generates them on-demand. The generated tokens will have a lifespan of one day.
This service will be the only service to possess the private key that is used to sign the tokens and will expose the public key for other services that want to verify tokens. This service will also be the only place where all the client IDs and secret keys are kept.
We will greatly simplify the implementation by stating that once a service gets a token, it can access any other service in our ecosystem. When a service is accessed with a token, ...