Securing Your Services With Authentication, Authorization

button-icon-arrow-right
button-icon-arrow-left

button-icon-arrow-leftBack

Event

Securing your services with authentication, authorization

14 August 2019

New York

Added 01-Jan-1970

gRPC makes it extremely simple to write complex, business-critical services, in a vast number of programming languages. Its simplicity and adaptability has made it simple for developers to adopt by easily generating code from structures and messages defined as protocol buffers. Writing a secure service based on gRPC, on the other hand, takes a little more effort. In this talk, we will be going through a model of how to secure a gRPC service using JWT based tokens to authenticate user access by relying on interceptors. We will also discuss models of how to provide role-based access control to authorize user access.

Top