Explores implementing authorization in microservices using JWT-based access tokens, covering four strategies for obtaining distributed authorization data: provide (embedding data in tokens), fetch (dynamic retrieval), replicate (local copies), and delegate (authorization service). Discusses JWT limitations including coupling risks, token staleness, size constraints, and security concerns. Uses RealGuardIO application examples to demonstrate when access token authorization works well for simple RBAC scenarios versus complex authorization requiring remote data from multiple services.
Table of contents
Overview of authorization in a microservice architecture §Obtaining remote authorization data §Using JWT-based access tokens for authorization §RealGuardIO authorization scenarios §Show me the code §Acknowledgements §Summary §What’s next? §Need help with accelerating software delivery? §1 Comment
Sort: