O'Reilly logo

Spring Microservices in Action by Kalpit Patel, John Carnell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Securing your microservices

This chapter covers

  • Learning why security matters in a microservice environment
  • Understanding the OAuth2 standard
  • Setting up and configuring a Spring-based OAuth2 service
  • Performing user authentication and authorization with OAuth2
  • Protecting your Spring microservice using OAuth2
  • Propagating your OAuth2 access token between services

Security. The mention of the word will often cause an involuntary groan from the developer who hears it. You’ll hear them mutter and curse under their breath, “It’s obtuse, hard to understand, and even harder to debug.” Yet you won’t find any developer (except maybe for inexperienced developers) say that that they don’t worry about security.

A secure application involves multiple ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required