OAuth 2.0 Client Credentials Flow is a common pattern used in microservices architecture for a federated identity model which nicely decouples the authentication domain from the business domain.
Category: Microservices
Running Batch Application using Spring Cloud Data Flow
In my previous article on running Spring Batch application in Cloud Foundry, we looked at how a Spring Batch application can be executed as a one-off task in PCF. We created a Spring boot batch application annotated as a Task and deployed it on PCF like any other cloud native application. Then the task was … Continue reading Running Batch Application using Spring Cloud Data Flow
Running Batch Application in Cloud Foundry
Cloud Foundry has become a platform of choice for large enterprises to run cloud native applications and transform the way applications are built and deployed. It provides the agility, scalability and flexibility to continuously launch new features quickly while reducing the risk. Cloud Foundry has been widely adopted to run Microservices which are associated with … Continue reading Running Batch Application in Cloud Foundry
Running Java application in Docker Container
In one of my earlier posts, we looked at how to create a Spark Application to read the Data from a CSV file. In this post, we'll take a look at how Docker image can be created for the Spark Financial Analysis application so that it can be easily run inside a container. The code … Continue reading Running Java application in Docker Container
Microservices – Database management using Liquibase
Over the last few years, the proliferation of microservices and cloud native architecture patterns have surfaced new challenges that are resulting in new tools and techniques being adopted by enterprises. This allows for a seamless transition for enterprises in their cloud native journey to be more agile and nimble. In this post we'll look at … Continue reading Microservices – Database management using Liquibase
JWT – Token Based Authentication
In my earlier post on Cryptography, we looked at some of the cryptographic techniques and cryptographic functions that are commonly used to secure the data. In this post, we'll discuss JSON Web Token (JWT) which is one of the most commonly used token based authentication. It has become quite popular since it allows the distributed systems to … Continue reading JWT – Token Based Authentication
AWS – Simple Queue Service
Message-oriented Middleware (MoM) allows various applications and microservices within an enterprise to communicate with each other by sending messages asynchronously. Some of the MoMs traditionally used by enterprises are Websphere MQ, Active MQ, TIBCO, Rabbit MQ etc. Message Queue is used for point to point communication between the message producer and message consumer. AWS Simple … Continue reading AWS – Simple Queue Service
Spring Boot Mutual Authentication (2 Way SSL/TLS)
In one of my earlier articles on cryptographic basics, I discussed about the 3 basic services provided by cryptographic techniques i.e. confidentiality, integrity and authentication. Let's see how we can have confidentiality and authentication implemented in a Spring Boot Application. SSL/TLS establishes an encrypted link between client and server application such that all the communication between the … Continue reading Spring Boot Mutual Authentication (2 Way SSL/TLS)
Service Discovery – Spring Cloud Eureka
In microservices architecture, we tend to create lot of services which are loosely coupled from each other. Inherently this distributed system design has more inter-service communication and hence each service running in cloud should be able to locate other dependent services easily. Service discovery in the past has been done using service locators or configured … Continue reading Service Discovery – Spring Cloud Eureka
Spring Cloud Configuration
In my previous post on Cloud Native Applications, we discussed the benefits of 12 factor application and the characteristics that makes the application cloud ready. Once of the characteristics we discussed was to store the configuration outside the build artifact. Now let's see how we can leverage Spring Cloud Configuration server to store and inject the configuration that … Continue reading Spring Cloud Configuration