17

Microservice Security with OAuth 2 and JSON Web Tokens

In this chapter, we will look at microservices-based architectures and look at how OAuth 2 with JSON Web Tokens (JWT) plays a role in securing microservices in a Spring- based application.

The following is a list of topics that will be covered in this chapter:

  • The general difference between monolithic applications and microservices
  • Comparing Service-Oriented Architectures (SOA) with microservices
  • The conceptual architecture of OAuth 2 and how it provides your services with trustworthy client access
  • Types of OAuth 2 access tokens
  • Types of OAuth 2 grant types
  • Examining JWT and their general structure
  • Implementing a resource server and authentication server used to grant access rights to ...

Get Spring Security - Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.