Chapter 7. Securing your microservices

This chapter covers

  • Learning why security matters in a microservice environment
  • Understanding the OAuth2 standard
  • Setting up and configuring a Spring-based OAuth2 service
  • Performing user authentication and authorization with OAuth2
  • Protecting your Spring microservice using OAuth2
  • Propagating your OAuth2 access token between services

Security. The mention of the word will often cause an involuntary groan from the developer who hears it. You’ll hear them mutter and curse under their breath, “It’s obtuse, hard to understand, and even harder to debug.” Yet you won’t find any developer (except maybe for inexperienced developers) say that that they don’t worry about security.

A secure application involves multiple ...

Get Spring Microservices in Action now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.