APIs & Gateways
Last updated
Last updated
Gateways providing protection from common attacks (layer 7 firewalls).
There are various ways that step 4 can happen:
Pure introspect (/introspection
)
Embedded token in JSON ("jwt":"ey..."
)
Token exchange (exchange access token to JWT token)
Regarding part 5, i.e., API to API calls, these can use the token obtained as follows:
Exchange - Use token exchange to get another token (on demand, powerful options)
Embed - Put more tokens inside the first token (when it happens on every request)
Share - Use the same token (when the APIs are in the same security domain)
Gateway check the request's scope(s) in order to even let you through the door.
Then, the app's API checks claims to find grained authorization.