Spring Cloud Gateway for Stateless Microservice Authorization

Поділитися
Вставка
  • Опубліковано 12 вер 2024
  • Improving and maintaining tech agility, time to market, and application modernization is challenging as the number of microservices we own and manage grows. How do you track who uses your applications? How can you establish and enforce common policies or flows to authenticate and authorize permissible use? How can you ensure effective governance?
    In this talk, we'll share the approach at TD Ameritrade to solve these cross-cutting functions in an efficient and effective way. We'll discuss why and how we decided on API Gateway using Spring Cloud Gateway; the different use cases we're solving; our implementation for authentication and authorization leveraging IDP, OAuth2, and JSON web tokens; and how we brought the whole solution together for microservices running on Pivotal Platform.
    Architects and developers attending this talk will see how the API Gateway pattern can help to successfully modernize web platforms with greater tech agility and faster time to market.
    Speakers: Saravanan Paramasivam; Software Engineer, TD Ameritrade; Chris Jackson; Senior Developer, TD Ameritrade; Taher Saif; Sr. Manager, TD Ameritrade
    Filmed at SpringOne Platform 2019
    Slides: www.slideshare...

КОМЕНТАРІ • 28

  • @ChinmayaDas
    @ChinmayaDas 4 роки тому +22

    Could you please share a sample code implementation of the example of external IDP and token exchange?

  • @khajalieubarrie5088
    @khajalieubarrie5088 Рік тому +1

    Just those of us watching this now. Monolithic Architecture is not old school. It’s in fact should be the de-facto standard to start writing your application using a “Modular”approach until you find the need to migrate to “Microservices”.

  • @qwarlockz8017
    @qwarlockz8017 4 роки тому +4

    Def great vid. Thanks for the clear and clean explanations.

  • @qinlingzhou8815
    @qinlingzhou8815 3 роки тому +1

    JWT is one of the best choices for Microservice AuthZ per my dev experience so far.

  • @guillermopereira2132
    @guillermopereira2132 4 роки тому +1

    Where can I find some example of your gateway api? Did you use and authorization code for the first token and client credentials for the second?

  • @ogyct
    @ogyct 3 роки тому +1

    I'd like to get more information, on how access token between FE and gateway acts. What if IDP doesn't support that?

  • @cookies4techies992
    @cookies4techies992 3 роки тому +2

    How does each microservice verify the JWT token it receives is the valid one. Even if it verifies that it is valid by calculating decoding and decrypting how it identify this user request is authorized one.

    • @Quester82
      @Quester82 2 роки тому

      Each service has mechanism to decode JWT token addressed to it and after extracting roles contained within JWT decides what to do with the request. Basically - every service has it's authorisation mechanism.

  • @venkateswaran8752
    @venkateswaran8752 4 роки тому +5

    please share sample code

  • @kellyfj
    @kellyfj 4 роки тому +1

    FWIW JWT tokens standard says Encryption is optional

  • @thanhlongtruong2713
    @thanhlongtruong2713 4 роки тому +2

    Hi! Why do we need to forward JWT token to microservices? Is it used to provide user information?

    • @valour.se47
      @valour.se47 4 роки тому +2

      I can be wrong but what i understand is that Jwt token have three parts in it, one is to hold user information so when you have roles set to users that role information will be in the token so that services can decide if they allow or deny the request.

    • @alexisgc19
      @alexisgc19 4 роки тому

      In short, yes.. It provides user information (id, roles..) to the services behind gateway

    • @alexisgc19
      @alexisgc19 4 роки тому

      At 24:40 "All the information needed to complete a particular request is sent along with JWT in the Authorization header"

    • @mikedqin
      @mikedqin 4 роки тому

      My understanding: 1) JWT token self-contained and it's signed, when Resource Server receives it, it can verify the JWT token is valid, and no need to contact Authorization Server. 2) JWT token can contains claims for authorization purpose and not limited to UserInfo claim, so in a scenario where Authorization Server receives the JWT token (not in this video), it can make decision if the request should be granted or not. 3) Token Exchange in the video above, the main purpose I guess is for point 1), Resource Server gets what it needs, it can validate the token, and no need to validate it with Authorization Server - no additional call is needed. 4) API Gateway acts as the Authorization Client - such as OAuth2 Client. 5) Alternatively Authentication Server can generates a JWT token with UserInfo claim. The client can pass the token to Authorization Server for authorizing the request. In this case, there is no Token Exchange.

    • @myobpro8516
      @myobpro8516 4 роки тому

      But how do you want to protect you microservices from unauthorized access ?

  • @princegovind
    @princegovind 4 роки тому +2

    Can some one post Github link for this

  • @pradhyumnakandamuru
    @pradhyumnakandamuru Рік тому

    It could have been great if there was a practical example of the implementation. That could have really helped

  • @adityabansal4033
    @adityabansal4033 4 роки тому +1

    How will microservices verify that jwt is valid or not?

    • @andresmtz98
      @andresmtz98 3 роки тому

      It's the IDP's responsability, I think

  • @kellyfj
    @kellyfj 4 роки тому +3

    Also 29:01 FYI Signing is not the same as encryption

  • @massiveblackwood
    @massiveblackwood 3 роки тому

    Code example?

  • @noimah
    @noimah 3 роки тому +1

    Aggregating Data on the Gateway can be problematic, would not recommend that. Don't put business logic on the gateway.

  • @kenmagg
    @kenmagg 4 роки тому +1

    Why offload something as important as identity to a third party?
    That seems like a security issue...

    • @kellyfj
      @kellyfj 4 роки тому +1

      Why offload your infrastructure to the cloud? Wouldn't that be a security issue too.

    • @kenmagg
      @kenmagg 4 роки тому

      @@kellyfj there's on prem or Colo vs cloud... Different levels of security for different things..
      Login/auth you'd think would be high security..

    • @shubitoxX
      @shubitoxX 4 роки тому

      Whether it is a 3rd party or not is completely up to you