How to Secure Your Microservices Architecture With JSON Web Tokens

  Переглядів 23,995

Techstrong TV

Techstrong TV

День тому

JSON Web Tokens (JWTs) encapsulate authorization data in a portable, stateless manner. But what happens when a request arrives at a context boundary such as an API gateway fronting microservices? In this webinar, Dan Moore, head of developer relations at FusionAuth, will discuss how authorization information can cross such boundaries, how JWTs can help you secure your microservices and which signing protocols make sense when. This webinar will cover:
- JWT basics, signing algorithms and how to avoid common issues with JWTs
- Common auth architectures for microservices and context boundaries
- JWT validation (it's not just about the signature!)
- Revoking JWTs
Authentication is core to any application and is commonly extracted to a standalone service. But how can you ensure that users only access data they should in a scalable, resilient and secure manner? This webinar will teach you how to approach authentication and authorization in a microservices architecture with JWTs.

КОМЕНТАРІ: 10
@AndrewMelnychuk0seen
@AndrewMelnychuk0seen Рік тому
This was really informative. Thank you.
@jmau2002
@jmau2002 9 місяців тому
Great. Answering many questions
@ofiry
@ofiry Рік тому
Great video! thanks
@abhishekmiet
@abhishekmiet Рік тому
informative video, thanks for sharing!!
@dogukan4283
@dogukan4283 2 роки тому
Thank you!
@TheGaneshkumawat
@TheGaneshkumawat 7 місяців тому
Gold content!!!
@tayyebshahbaz2673
@tayyebshahbaz2673 4 місяці тому
Great Vedio
@JKW3973
@JKW3973 6 місяців тому
Assuming any user with a JWT has access to all microservices can't you just validate a JWT within the API Gateway and be done. Then passing the request to the microservices without any further auth.
@libby6636
@libby6636 5 місяців тому
No really. Actually, the privilege authorization happens after the process of authentication. We can encode the access limitation specific logic in this phase, and these two processes mentioned above can be done at the API gateway layer.
@libby6636
@libby6636 5 місяців тому
In addition, the privileges required for a specific action or resource can be synchronized to the API Gateway, we can easily compare the privileges decrypted from the JWT with that from other micro services to implement our own access control logic.
Microservice Authentication and Authorization | Nic Jackson
1:05:43
DevOps Conference
Переглядів 76 тис.
skibidi toilet 73 (full episode)
09:41
DaFuq!?Boom!
Переглядів 17 млн
Authentication as a Microservice
50:26
Oracle Developers
Переглядів 213 тис.
Top 12 Tips For API Security
9:47
ByteByteGo
Переглядів 55 тис.
What is JWT? JSON Web Tokens Explained (Java Brains)
14:53
Java Brains
Переглядів 1 млн
JSON Web Tokens (JWTs) explained with examples | System Design
11:24
Design Microservice Architectures the Right Way
48:30
InfoQ
Переглядів 704 тис.
Authentication & Authorization in Microservice Architectures
5:01
Jonathan Meier
Переглядів 39 тис.
Why is JWT popular?
5:14
ByteByteGo
Переглядів 248 тис.
How to Get a Developer Job - Even in This Economy [Full Course]
3:59:46
freeCodeCamp.org
Переглядів 2 млн
What is an API Gateway?
15:02
Gaurav Sen
Переглядів 45 тис.
The PA042 SAMSUNG S24 Ultra phone cage turns your phone into a pro camera!
0:24
Вы поможете украсть ваш iPhone
0:56
Romancev768
Переглядів 215 тис.
Игровой ноутбук за 100тр в МВИДЕО
0:58
KOLBIN REVIEW
Переглядів 504 тис.
M4 iPad Pro Impressions: Well This is Awkward
12:51
Marques Brownlee
Переглядів 5 млн
Игровой ноутбук за 100тр в МВИДЕО
0:58
KOLBIN REVIEW
Переглядів 504 тис.
Портативная PS 5 🎮 #ps5 #expressly
0:22
ExpresSLY Shorts
Переглядів 258 тис.