Solutionunvalidated
The most correct OAuth way to design this is to use scopes and claims. — access tokens and the user identity to flow between microservices. Tension: without security concerns. Outcome: The APIs also check for required scopes.
d19d72f2-dacf-47c8-8331-f9d635646bf9
The most correct OAuth way to design this is to use scopes and claims. — access tokens and the user identity to flow between microservices. Tension: without security concerns. Outcome: The APIs also check for required scopes.