UsefulLinks
Computer Science
Microservices
Java Microservices
1. Introduction to Microservices Architecture
2. Java Fundamentals for Microservices
3. Spring Framework Fundamentals
4. Spring Boot for Microservices
5. Building RESTful APIs
6. Data Persistence with JPA
7. Inter-Service Communication
8. Service Discovery and Registration
9. API Gateway Implementation
10. Resilience and Fault Tolerance
11. Configuration Management
12. Containerization with Docker
13. Container Orchestration
14. Observability and Monitoring
15. Security Implementation
16. Testing Microservices
17. Advanced Microservice Patterns
18. Alternative Java Frameworks
19. Production Deployment Considerations
15.
Security Implementation
15.1.
Security Principles
15.1.1.
Defense in Depth
15.1.2.
Least Privilege
15.1.3.
Secure by Default
15.1.4.
Zero Trust Architecture
15.2.
Authentication Mechanisms
15.2.1.
Basic Authentication
15.2.2.
Token-based Authentication
15.2.3.
OAuth 2.0 Flow
15.2.4.
OpenID Connect
15.2.5.
JWT Tokens
15.3.
Authorization Strategies
15.3.1.
Role-based Access Control
15.3.2.
Attribute-based Access Control
15.3.3.
Resource-based Authorization
15.3.4.
Method-level Security
15.4.
Spring Security Integration
15.4.1.
Security Configuration
15.4.2.
Authentication Providers
15.4.3.
Authorization Rules
15.4.4.
Security Filters
15.4.5.
CORS Configuration
15.5.
JWT Implementation
15.5.1.
Token Structure
15.5.2.
Token Generation
15.5.3.
Token Validation
15.5.4.
Token Refresh
15.5.5.
Token Storage
15.6.
Service-to-Service Security
15.6.1.
Mutual TLS
15.6.2.
API Key Authentication
15.6.3.
Service Mesh Security
15.6.4.
Network Policies
15.7.
Secret Management
15.7.1.
Environment Variables
15.7.2.
Configuration Files
15.7.3.
Secret Stores
15.7.4.
Key Rotation
Previous
14. Observability and Monitoring
Go to top
Next
16. Testing Microservices