Spring Cloud Gateway for Stateless Microservice Authorization

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ก.ย. 2024
  • Improving and maintaining tech agility, time to market, and application modernization is challenging as the number of microservices we own and manage grows. How do you track who uses your applications? How can you establish and enforce common policies or flows to authenticate and authorize permissible use? How can you ensure effective governance?
    In this talk, we'll share the approach at TD Ameritrade to solve these cross-cutting functions in an efficient and effective way. We'll discuss why and how we decided on API Gateway using Spring Cloud Gateway; the different use cases we're solving; our implementation for authentication and authorization leveraging IDP, OAuth2, and JSON web tokens; and how we brought the whole solution together for microservices running on Pivotal Platform.
    Architects and developers attending this talk will see how the API Gateway pattern can help to successfully modernize web platforms with greater tech agility and faster time to market.
    Speakers: Saravanan Paramasivam; Software Engineer, TD Ameritrade; Chris Jackson; Senior Developer, TD Ameritrade; Taher Saif; Sr. Manager, TD Ameritrade
    Filmed at SpringOne Platform 2019
    Slides: www.slideshare...

ความคิดเห็น • 28

  • @ChinmayaDas
    @ChinmayaDas 4 ปีที่แล้ว +22

    Could you please share a sample code implementation of the example of external IDP and token exchange?

  • @khajalieubarrie5088
    @khajalieubarrie5088 ปีที่แล้ว +1

    Just those of us watching this now. Monolithic Architecture is not old school. It’s in fact should be the de-facto standard to start writing your application using a “Modular”approach until you find the need to migrate to “Microservices”.

  • @qwarlockz8017
    @qwarlockz8017 4 ปีที่แล้ว +4

    Def great vid. Thanks for the clear and clean explanations.

  • @qinlingzhou8815
    @qinlingzhou8815 3 ปีที่แล้ว +1

    JWT is one of the best choices for Microservice AuthZ per my dev experience so far.

  • @cookies4techies992
    @cookies4techies992 3 ปีที่แล้ว +2

    How does each microservice verify the JWT token it receives is the valid one. Even if it verifies that it is valid by calculating decoding and decrypting how it identify this user request is authorized one.

    • @Quester82
      @Quester82 2 ปีที่แล้ว

      Each service has mechanism to decode JWT token addressed to it and after extracting roles contained within JWT decides what to do with the request. Basically - every service has it's authorisation mechanism.

  • @ogyct
    @ogyct 3 ปีที่แล้ว +1

    I'd like to get more information, on how access token between FE and gateway acts. What if IDP doesn't support that?

  • @guillermopereira2132
    @guillermopereira2132 4 ปีที่แล้ว +1

    Where can I find some example of your gateway api? Did you use and authorization code for the first token and client credentials for the second?

  • @venkateswaran8752
    @venkateswaran8752 4 ปีที่แล้ว +5

    please share sample code

  • @kellyfj
    @kellyfj 4 ปีที่แล้ว +1

    FWIW JWT tokens standard says Encryption is optional

  • @thanhlongtruong2713
    @thanhlongtruong2713 4 ปีที่แล้ว +2

    Hi! Why do we need to forward JWT token to microservices? Is it used to provide user information?

    • @valour.se47
      @valour.se47 4 ปีที่แล้ว +2

      I can be wrong but what i understand is that Jwt token have three parts in it, one is to hold user information so when you have roles set to users that role information will be in the token so that services can decide if they allow or deny the request.

    • @alexisgc19
      @alexisgc19 4 ปีที่แล้ว

      In short, yes.. It provides user information (id, roles..) to the services behind gateway

    • @alexisgc19
      @alexisgc19 4 ปีที่แล้ว

      At 24:40 "All the information needed to complete a particular request is sent along with JWT in the Authorization header"

    • @mikedqin
      @mikedqin 4 ปีที่แล้ว

      My understanding: 1) JWT token self-contained and it's signed, when Resource Server receives it, it can verify the JWT token is valid, and no need to contact Authorization Server. 2) JWT token can contains claims for authorization purpose and not limited to UserInfo claim, so in a scenario where Authorization Server receives the JWT token (not in this video), it can make decision if the request should be granted or not. 3) Token Exchange in the video above, the main purpose I guess is for point 1), Resource Server gets what it needs, it can validate the token, and no need to validate it with Authorization Server - no additional call is needed. 4) API Gateway acts as the Authorization Client - such as OAuth2 Client. 5) Alternatively Authentication Server can generates a JWT token with UserInfo claim. The client can pass the token to Authorization Server for authorizing the request. In this case, there is no Token Exchange.

    • @myobpro8516
      @myobpro8516 4 ปีที่แล้ว

      But how do you want to protect you microservices from unauthorized access ?

  • @kellyfj
    @kellyfj 4 ปีที่แล้ว +3

    Also 29:01 FYI Signing is not the same as encryption

  • @princegovind
    @princegovind 4 ปีที่แล้ว +2

    Can some one post Github link for this

  • @pradhyumnakandamuru
    @pradhyumnakandamuru ปีที่แล้ว

    It could have been great if there was a practical example of the implementation. That could have really helped

  • @adityabansal4033
    @adityabansal4033 4 ปีที่แล้ว +1

    How will microservices verify that jwt is valid or not?

    • @andresmtz98
      @andresmtz98 3 ปีที่แล้ว

      It's the IDP's responsability, I think

  • @massiveblackwood
    @massiveblackwood 3 ปีที่แล้ว

    Code example?

  • @noimah
    @noimah 3 ปีที่แล้ว +1

    Aggregating Data on the Gateway can be problematic, would not recommend that. Don't put business logic on the gateway.

  • @kenmagg
    @kenmagg 4 ปีที่แล้ว +1

    Why offload something as important as identity to a third party?
    That seems like a security issue...

    • @kellyfj
      @kellyfj 4 ปีที่แล้ว +1

      Why offload your infrastructure to the cloud? Wouldn't that be a security issue too.

    • @kenmagg
      @kenmagg 4 ปีที่แล้ว

      @@kellyfj there's on prem or Colo vs cloud... Different levels of security for different things..
      Login/auth you'd think would be high security..

    • @shubitoxX
      @shubitoxX 4 ปีที่แล้ว

      Whether it is a 3rd party or not is completely up to you