2019
DOI: 10.17706/jsw.14.6.257-264
|View full text |Cite
|
Sign up to set email alerts
|

Applying Spring Security Framework and OAuth2 To Protect Microservice Architecture API

Abstract: Since 2014, Microservice Architecture (MSA) has been widely applied and deployed by big companies such as Google, Netflix and Twitter. This is a way of architecting software systems in which the services of a single application are decomposed then deployed and executed separately. This research examines the possibility of applying Spring Security Framework and OAuth2 to secure microservice APIs which are built on top of Spring Framework. By developing a Proof of Concept (POC) of an Inventory Management System … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…However, these studies were performed separately without verifying the efficacy of the Spring Framework (SF), SSF, and OAuth2 when these technologies were used on MSA endpoint authentication and authorization. Nguyen et al [15] created a proof-of-concept (PoC) MSA application using SF, spring protection, and OAuth2 to reduce the information gap on MSA and API security. They did not test how the solution would work after integrating with a third-party IAM platform.…”
Section: Passwordencodermentioning
confidence: 99%
See 3 more Smart Citations
“…However, these studies were performed separately without verifying the efficacy of the Spring Framework (SF), SSF, and OAuth2 when these technologies were used on MSA endpoint authentication and authorization. Nguyen et al [15] created a proof-of-concept (PoC) MSA application using SF, spring protection, and OAuth2 to reduce the information gap on MSA and API security. They did not test how the solution would work after integrating with a third-party IAM platform.…”
Section: Passwordencodermentioning
confidence: 99%
“…Therefore, maintaining the privacy and security of EHRs has become an open challenge. In combination with open source KeyCloak software [27], the Spring Security [14][15][16] paradigm may offer an opportunity to enhance security features, functionalities, identity brokering, session handling, CORS support, access management solutions, and security assertion markup language (SAML) [28] for a health system's web and REST APIs. The required security background for understanding the SSK security solution is discussed in this section.…”
Section: Basic Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…[23] Applying Spring Security Framework and OAuth2 To Protect Microservice Architecture API. [24] Design of a micro-service based Data Pool for device integration to speed up digitalization. [25] Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems.…”
mentioning
confidence: 99%