In this chapter, we have learned how important it is to have the TLS layer or HTTPS in place for all web traffic. We have added a self-signed certificate to our sample application. I would like to reiterate that, for a production application, you must use the certificates offered by certificate-signing authorities. We have also explored the fundamentals of OAuth 2.0 and various OAuth 2.0 grant flows. Different OAuth 2.0 grant flows are implemented using Spring Security and OAuth 2.0. In the next chapter, we'll implement the UI for the sample OTRS project and explore how all of the components work together.

Mastering Microservices with Java
By :

Mastering Microservices with Java
By:
Overview of this book
Microservices are key to designing scalable, easy-to-maintain applications. This latest edition of Mastering Microservices with Java, works on Java 11. It covers a wide range of exciting new developments in the world of microservices, including microservices patterns, interprocess communication with gRPC, and service orchestration.
This book will help you understand how to implement microservice-based systems from scratch. You'll start off by understanding the core concepts and framework, before focusing on the high-level design of large software projects. You'll then use Spring Security to secure microservices and test them effectively using REST Java clients and other tools. You will also gain experience of using the Netflix OSS suite, comprising the API Gateway, service discovery and registration, and Circuit Breaker. Additionally, you'll be introduced to the best patterns, practices, and common principles of microservice design that will help you to understand how to troubleshoot and debug the issues faced during development.
By the end of this book, you'll have learned how to build smaller, lighter, and faster services that can be implemented easily in a production environment.
Table of Contents (22 chapters)
Preface
A Solution Approach
Environment Setup
Domain-Driven Design
Implementing a Microservice
Section 2: Microservice Patterns, Security, and UI
Microservice Patterns - Part 1
Microservice Patterns - Part 2
Securing Microservices
Consuming Services Using the Angular App
Section 3: Inter-Process Communication
Inter-Process Communication Using REST
Inter-Process Communication Using gRPC
Inter-Process Communication Using Events
Section 4: Common Problems and Best Practices
Transaction Management
Service Orchestration
Troubleshooting Guide
Best Practices and Common Principles
Converting a Monolithic App to a Microservice-Based App
Other Books You May Enjoy
How would like to rate this book
Customer Reviews