Summary
In this chapter, you learned the general difference between monolithic applications and microservices and compared SOA with microservices. You also learned the conceptual architecture of OAuth 2 and how it provides your services with trustworthy client access, and learned about the types of OAuth 2 access tokens and the types of OAuth 2 client credentials types.
We examined the JWT and their general structure, implemented a resource server and authorization server used to grant access rights to clients to access OAuth 2 resources, and implemented a RESTful client to gain access to resources through an OAuth 2 grant flow.
We’ve concluded by demonstrating a practical OAuth 2 example implementation using spring-security. Moving forward, the next chapter will explore the integration with Central Authentication Service (CAS) to enable Single Sign-On (SSO) and Single Logout (SLO) functionalities for your Spring Security-enabled applications.