Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Art of Micro Frontends

You're reading from   The Art of Micro Frontends Build highly scalable, distributed web applications with multiple teams

Arrow left icon
Product type Paperback
Published in Oct 2024
Publisher Packt
ISBN-13 9781835460351
Length 356 pages
Edition 2nd Edition
Arrow right icon
Author (1):
Arrow left icon
Florian Rappl Florian Rappl
Author Profile Icon Florian Rappl
Florian Rappl
Arrow right icon
View More author details
Toc

Table of Contents (27) Chapters Close

Preface 1. Part 1:The Hive – Introducing Frontend Modularization FREE CHAPTER
2. Chapter 1: Why Micro Frontends? 3. Chapter 2: Common Challenges and Pitfalls 4. Chapter 3: Deployment Scenarios 5. Chapter 4: Domain Decomposition 6. Part 2: Dry Honey – Implementing Micro Frontend Architectures
7. Chapter 5: Types of Micro Frontend Architectures 8. Chapter 6: The Web Approach 9. Chapter 7: Server-Side Composition 10. Chapter 8: Edge-Side Composition 11. Chapter 9: Client-Side Composition 12. Chapter 10: SPA Composition 13. Chapter 11: Siteless UIs 14. Part 3: Bee Brood – Implementation Details
15. Chapter 12: Sharing Dependencies with Module Federation 16. Chapter 13: Isolating CSS 17. Chapter 14: Securing the Application 18. Chapter 15: Decoupling Using a Discovery Service 19. Part 4: Busy Bees – Scaling Organizations
20. Chapter 16: Preparing Teams and Stakeholders 21. Chapter 17: Dependency Management, Governance, and Security 22. Chapter 18: Impact of Micro Frontends on UX and Screen Design 23. Chapter 19: Building a Great Developer Experience 24. Chapter 20: Case Studies 25. Index 26. Other Books You May Enjoy

Using web standards to harden security

Security is one of the most important aspects when creating a web application. Whole companies have been victims of compromised security, so you can imagine what happens to single projects. To prevent such extreme scenarios, we need to keep a very close eye on potential security issues.

Quite often, security issues arise when the implementation of our solution deviates from the official standards. For instance, if for some reason we want to avoid session cookies as a means of authentication in our application, we could use a JSON Web Token (JWT) instead.

While the security aspects of a JWT deserve their own book, most security problems with this approach will come down to the question “Where should it be stored in the user’s browser?”. With a session cookie, this question would not be asked. The browser takes care of storing and providing it to the appropriate requests. The browser also restricts access to the session...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £16.99/month. Cancel anytime