From the course: Microservices: Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Distributed access management patterns

Distributed access management patterns

From the course: Microservices: Security

Start my 1-month free trial

Distributed access management patterns

- [Instructor] As microservices have matured, so have the techniques used to secure them. In security domains, such as identity and access management, you're going to even discover general patterns that have emerged, like the ones we're about to discuss. Using patterns allows us to abstract away the finer implementation details to see how a system works at a high level. Our discussion will leave a few key points for later. However, it's important we highlight two concepts before we proceed, clients and tokens. Client is a general term that describes any hardware or software calling a service. For microservice architectures, this could be a mobile device, a single page application, a Java backend, a batch process, or another company's application. Now, clients are also used by end users to access their data on APIs or microservices. We're also going to talk about tokens. You can think of these as digital keys that…

Contents