How to secure microservice applications with role-based access control? (4/7)

Foto Source: Nataliya Vaitkevich (www. pexels.com) Option: JWT In the previous blog part (part 3) we have used  BasicAuthentication for transferring credentials which are then enforced in the requested service. This approach has several disadvantages. First and foremost, each service has access to user credentials. Thus, if one service is hacked, all services are impacted. […]