Authentication and Authorization in Microservice-Based Systems: Survey of Architecture Patterns

  • Barabanov A
  • et al.
N/ACitations
Citations of this article
42Readers
Mendeley users who have this article in their library.

Abstract

Abstract Objective. Service-oriented architecture and its microservice-based approach increase an attack surface of applications. Exposed microservices become a pivot point for advanced persistent threats and completely change the threat landscape. Correctly implemented authentication and authorization architecture patterns are basis of any software maturity program. The aim of this study is to provide a helpful resource to application security architect and developers on existing architecture patterns to implement authentication and authorization in microservices-based systems. Method. In this paper, we conduct a systematic review of major electronic databases and libraries as well as security standards and presentations at the major security conferences. Results and practical relevance. In this work based on research papers and major security conferences presentations analysis, we identified industry best practices in authentication and authorization patterns and its applicability depending on environment characteristic. For each described patterns we reviewed its advantages and disadvantages that could be used as decision-making criteria for application security architects during architecture design phase.

Cite

CITATION STYLE

APA

Barabanov, A., & Makrushin, D. (2020). Authentication and Authorization in Microservice-Based Systems: Survey of Architecture Patterns. Voprosy Kiberbezopasnosti, (4(38)), 32–43. https://doi.org/10.21681/2311-3456-2020-04-32-43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free