From the course: Microservices: Security
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Distributed access management patterns
From the course: Microservices: Security
Distributed access management patterns
- [Instructor] As microservices have matured, so have the techniques used to secure them. In security domains, such as identity and access management, you're going to even discover general patterns that have emerged, like the ones we're about to discuss. Using patterns allows us to abstract away the finer implementation details to see how a system works at a high level. Our discussion will leave a few key points for later. However, it's important we highlight two concepts before we proceed, clients and tokens. Client is a general term that describes any hardware or software calling a service. For microservice architectures, this could be a mobile device, a single page application, a Java backend, a batch process, or another company's application. Now, clients are also used by end users to access their data on APIs or microservices. We're also going to talk about tokens. You can think of these as digital keys that…