Derza Arsad

60%
Flag icon
In such a situation, it made sense to deal with the more complex rights management authorization process in a different way—essentially using the JWT token for the initial “simple” authorization, and then doing a subsequent lookup on a data store to fetch the additional fields as required. This meant the bulk of the system could just work off the tokens.
Building Microservices: Designing Fine-Grained Systems
Rate this book
Clear rating
Open Preview