Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Cross-Service Authentication Mechanisms in Applications with Microservice Architecture ; Механизмы межсервисной аутентификации в приложениях с микросервисной архитектурой

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • المؤلفون: Zimina, Ksenia I.; Laponina, Olga R.
  • المصدر:
    International Journal of Open Information Technologies; Vol 11, No 5 (2023); 146-154 ; 2307-8162
  • نوع التسجيلة:
    article in journal/newspaper
  • اللغة:
    Russian
  • معلومة اضافية
    • بيانات النشر:
      International Journal of Open Information Technologies
    • الموضوع:
      2023
    • Collection:
      International Journal of Open Information Technologies (INJOIT)
    • نبذة مختصرة :
      In this article discussed cross-service authentication. It is one of the most important aspects of security in modern applications with microservice architecture. The basic mechanisms of service-to-service authentication, such as tokens and certificates usage, are represented in the article. An example of service-to-service authentication architecture is also given. The article is a useful resource for developers who are working in the field of service-oriented architecture and interesting in security issues. It provides an extensive overview of authentication mechanisms and key points to consider during designing a microservice architecture. The article proposes to use the mutual TLS (mTLS) protocol, which is the most popular way to secure cross-service communication during microservices deploying. In this approach the responsible for the cross-service authentication lies with the mTLS proxy deployed for each microservice of the system. mTLS proxies work as intermediaries between the microservices, accepting requests for a secure communication channel establishment. The proxy approach simplifies the authentication process between two microservices, that can run on different platforms, by using different protocols and data formats. By using the mTLS proxy, the solution is easy to scale, because it is enough to deploy a new instance of the mTLS proxy in case of new microservices appearing in the system. Also, the proxy does not depend on the language or system implementing an associated microservice, which makes the solution universal. ; В данной статье обсуждается тема межсервисной аутентификации, которая является одним из важных аспектов безопасности в современных приложениях с микросервисной архитектурой. В статье представлены основные механизмы работы service-to-service аутентификации, включая использование токенов и сертификатов. Приводится пример архитектуры сервис-сервисной аутентификации. Статья является полезным ресурсом для разработчиков, которые работают в области сервис-ориентированных архитектур и ...
    • File Description:
      application/pdf
    • Relation:
      http://injoit.org/index.php/j1/article/view/1560/1450; http://injoit.org/index.php/j1/article/view/1560
    • Rights:
      Copyright (c) 2023 International Journal of Open Information Technologies
    • الرقم المعرف:
      edsbas.7A407D56