How to secure microservice applications with role-based access control? (6/7)

Option: API Gateway Foto Source: Jeswin Thomas (www.pexels.com) In the last blog “OpenID Connect & Keycloak (part 5), we have described how a 3rd party component (Keycloak) can provide intermediary services for trust and security. Amongst others, keycloak takes care of the generation and configuration of the JWT token. The good thing: As all involved […]

How to secure microservice applications with role-based access control? (7/7)

Foto Source: Darrel Und (www.pexels.com) Option: Service Mesh We have already introduced many different options how to secure micro-service applications based on roles (RBAC). In the last part of this series, we will explore how to use a Service Mesh for RBAC. For the implementation of the Service Mesh we are using the Open Source […]

How to secure microservice applications with role-based access control? (4/7)

Foto Source: Nataliya Vaitkevich (www. pexels.com) Option: JWT In the previous blog part (part 3) we have used  BasicAuthentication for transferring credentials which are then enforced in the requested service. This approach has several disadvantages. First and foremost, each service has access to user credentials. Thus, if one service is hacked, all services are impacted. […]

How to secure microservice applications with role-based access control? (5/7)

Foto Source: Ron Lach (www.pexels.com) Option: OpenID & Keycloak In the previous blog (part 4), we have introduced JSON Web Token to allow more transparent and convenient authentication and access management. In this blog (part 5), we will explore how we can extend the concept of a JWT to achieve even better standardization through oAuth2 […]

How to secure microservice applications with role-based access control? (1/7)

Foto Source: Life of Pix (www.pixels.com) Role-based Access Control (shortly RBAC) is one of the first things that come to mind if you think about security. But how can you do this consistently, without overburdening developers and IT-operation? And how can this be done in the context of micro-services architectures or – more generally speaking […]

How to secure microservice applications with role-based access control (2/7)?

Foto Source: Ron Lach (www. pixels.com) Option: HTTP Query Param In Part 2 of our 7-part blog series “How to secure microservice applications with role-based access control”, we will build the basic services and establish a connection. Later, we are going to implement a basic Role-based Access Control (RBAC) by transmitting the role information via […]

How to secure microservice applications with role-based access control? (3/7)

Foto Source: CottonBro Studio (www.pexels.com) Option: BasicAuthentication In the previous post (Part 2), we have set the scene by implementing a basic service-to-service communication with 3 REST end-points (publicEP, userEP, adminEP). The checking of the role has been done programmatically against an HTTP query parameter. We have elaborated on the down-sides of this option and […]