Research on Unified Authentication and Authorization in Microservice Architecture | IEEE Conference Publication | IEEE Xplore

Research on Unified Authentication and Authorization in Microservice Architecture


Abstract:

Microservice architecture reduces the coupling between application modules, which is conducive to the development, deployment and operation and maintenance of complex app...Show More

Abstract:

Microservice architecture reduces the coupling between application modules, which is conducive to the development, deployment and operation and maintenance of complex application systems. However, compared with the monolithic architecture, the access control of its resources becomes more complex. Based on the application scenario of enterprise system micro service architecture, aiming at the high security requirements of business system, through the analysis and research of micro service architecture, this paper designs a set of access control solution, which can meet the requirements of unified authentication, improving the efficiency of authority verification and accelerating the system development speed under the microservice architecture, which has reference for enterprise application system design significance.
Date of Conference: 28-31 October 2020
Date Added to IEEE Xplore: 24 December 2020
ISBN Information:

ISSN Information:

Conference Location: Nanning, China
References is not available for this document.

I. Introduction

Monolithic Architecture applications generally treat all application functions and data as a whole. Applications are the smallest deployment unit, and all business logic processing requests can run independent processes [1]. With the rapid development of the Internet industry, the traditional single application architecture cannot meet the demand changes, and the problem of fast function iterations is becoming more and more prominent. In this case, the microservice architecture has the flexibility, scalability, flexibility, and stability of the architecture [2]. The microservice architecture reduces the coupling between application modules and is beneficial to the development and maintenance of complex application systems. However compared with single application, access control in a microservice application becomes more complex. In the microservice architecture, every microservice needs to write authentication module, which is not only troublesome, but also inconvenient for unified management and expansion. Therefore, it is necessary to implement unified authentication. The main problems of unified authentication in microservice architecture are: (1) how to realize the centralized management of users, roles and permissions; (2) how to realize unified login and facilitate the expansion of microservices; (3) how to improve the efficiency of authentication and authorization.

Select All
1.
Dragoni N., Giallorrnzo S., Lafuente A., et al. Microservices: Yesterday, today, and tomorrow.Present andUlterior Software Engineering, No. 4, 2017, pp. 195–216.
2.
Huiyong Luo. Implementation of Universal Microservice User Privileges Management and Control. International Journal of Intelligent Information and Management Science, 2307-0692, Vol. 8, No. 3, June, 2019,pp. 238–242.
3.
Zhu BoChang. Research on the Domestic Application Status of Autho rized Login Based on OAuth 2.0 Protocol. Modern Information Technology, Vol. 3, No. 20, Oct. 2019, pp. 151–154, DOI: 10.19850/j.cnki.2096-4706.2019.20.051.
4.
Introduction to JSON Web Tokens. https://jwt.io/introduction/.
5.
Spring cloud (5) Service Gateway Zuul. https://blog.csdn.net/yanmei_yaomy/article/details/89925045.
6.
Bai Jiameng, Kou YingShuai, Liu ZeYi, Zha Daren. Design and Impl ementation of Role Based Authority Management System for Cloud Computing Platform. Netinfo Security, Vol. 20, No. 1, 2020, pp. 75–82, doi : 10.3969/j.issn.1671-1122.2020.01.011.
7.
Spring boot: integrating spring security. https://www.cnblogs.com/xifengxiaoma/p/11106220.html.
8.
Spring Security. https://spring.io/projects/spring-security.

Contact IEEE to Subscribe

References

References is not available for this document.