Securing service to service communication with JWT
Most of us have worked with services where we have a separate authenticator module or an IDP service which we invoke as the first step in our web workflow. Only once the user is authenticated we call other business services. This is a typical approach several architectures takes. This makes our workflows simpler as once … Continue reading Securing service to service communication with JWT