9 Securing your microservices

This chapter covers

  • Learning why security matters in a microservice environment
  • Understanding OAuth2 and OpenID
  • Setting up and configuring Keycloak
  • Performing authentication and authorization with Keycloak
  • Protecting your Spring microservice with Keycloak
  • Propagating access tokens between services

Now that we have a robust microservices architecture, the task of covering security vulnerabilities becomes more and more essential. In this chapter, security and vulnerability go hand in hand. We’ll define vulnerability as a weakness or flaw presented in an application. Of course, all systems have vulnerabilities, but the big difference lies in whether these vulnerabilities are exploited and cause harm.

Mentioning ...

Get Spring Microservices in Action, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.