Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Microservices with Spring Boot and Spring Cloud

You're reading from   Hands-On Microservices with Spring Boot and Spring Cloud Build and deploy Java microservices using Spring Cloud, Istio, and Kubernetes

Arrow left icon
Product type Paperback
Published in Sep 2019
Publisher Packt
ISBN-13 9781789613476
Length 668 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Magnus Larsson AB Magnus Larsson AB
Author Profile Icon Magnus Larsson AB
Magnus Larsson AB
Arrow right icon
View More author details
Toc

Table of Contents (25) Chapters Close

Preface 1. Section 1: Getting Started with Microservice Development Using Spring Boot
2. Introduction to Microservices FREE CHAPTER 3. Introduction to Spring Boot 4. Creating a Set of Cooperating Microservices 5. Deploying Our Microservices Using Docker 6. Adding an API Description Using OpenAPI/Swagger 7. Adding Persistence 8. Developing Reactive Microservices 9. Section 2: Leveraging Spring Cloud to Manage Microservices
10. Introduction to Spring Cloud 11. Adding Service Discovery Using Netflix Eureka and Ribbon 12. Using Spring Cloud Gateway to Hide Microservices Behind an Edge Server 13. Securing Access to APIs 14. Centralized Configuration 15. Improving Resilience Using Resilience4j 16. Understanding Distributed Tracing 17. Section 3: Developing Lightweight Microservices Using Kubernetes
18. Introduction to Kubernetes 19. Deploying Our Microservices to Kubernetes 20. Implementing Kubernetes Features as an Alternative 21. Using a Service Mesh to Improve Observability and Management 22. Centralized Logging with the EFK Stack 23. Monitoring Microservices 24. Other Books You May Enjoy

Summary

In this chapter, we have learned how to use Spring Security to protect our APIs.

We have seen how easy it is to enable HTTPS to prevent eavesdropping by third parties using Spring Security. With Spring Security, we have also learned that it is straightforward to restrict access and the discovery server, Netflix Eureka, using HTTP basic authentication. Finally, we have seen how we can use Spring Security to simplify the use of OAuth 2.0 and OpenID Connect to allow third-party client applications to access our APIs in the name of a user, but without requiring that the user share credentials with the client application. We have learned both how to set up a local OAuth 2.0 authorization server based on Spring Security and also how to change the configuration so that an external OpenID Connect provider, Auth0, can be used instead.

One concern, however, is how to manage the...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime