From the course: Microservices: Security

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Access scenarios

Access scenarios

From the course: Microservices: Security

Start my 1-month free trial

Access scenarios

- [Instructor] Whether you are building microservices or a client calling them through an API, it is helpful to understand the wide array of complex access scenarios that can influence your security scheme. Access to a microservice occurs through a client, which is the system making the call to the service. Microservices are not directly accessed by end users. In many cases, clients don't directly access a microservice. All of their calls are passed through the API gateway. Additional complexity is introduced when we start to consider the different types of clients that are possible. Some clients known as public clients are unable to maintain the confidentiality of their credentials. For example, single page applications are unable to store credentials securely because they run in the browser where their credentials could be accessed by an attacker. On the other hand, confidential clients can protect the confidentiality…

Contents