You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/journey/mission-3.md
+17-11Lines changed: 17 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
---
2
-
title: "Managing authorizations in microservices."
2
+
title: "Managing Authorization in Microservices "
3
3
date: 2024-08-09T20:11:50+03:00
4
4
draft: false
5
-
description: "Discovering a way to manage authorizations and permissions in a microservices architecture using authorizations-as-service."
5
+
description: "Discovering a way to manage authorization and permissions in microservices architecture using authorization-as-a-service 🔐."
6
6
image: "/images/journey/auth-as-service.png"
7
7
imageBig: "/images/journey/auth-as-service.png"
8
8
categories:
@@ -12,27 +12,31 @@ avatar: "/images/avatar.webp"
12
12
13
13
## Authorizations in Microservices
14
14
15
-
While developing a monolithic application, managing authorizations and permissions is a bit easier, as you can have a single point of control for all the authorizations and permissions. However, microservices have become a bit more complex.
15
+
When developing a monolithic application, managing authorizations and permissions is a bit easier since you have a single point of control for all authorizations and permissions. However, with the rise of microservices, this task becomes more complex.
16
16
17
-
In a microservices architecture, each service has its own database and logic for handling permissions. This can lead to a lot of duplication and inconsistency in the way permissions are managed across services. also, there will be an issue of sharing the permissions across services.
17
+
In a microservices architecture, each service typically has its own database and logic for handling permissions. This can lead to duplication and inconsistency in how permissions are managed across services. Additionally, sharing permissions between services can become problematic.
18
18
19
-
One way to solve this issue is to use an authorization-as-service. This means that you have a separate service that is responsible for managing all the authorizations for all the services in your architecture.
19
+
One way to solve this issue is by using **Authorization-as-a-Service** 🔐. This approach involves creating a separate service dedicated to managing all authorizations for the various services within your architecture. This centralizes control, ensuring consistency and simplifying the management of permissions across your microservices. 🌐
20
20
21
21
22
-
### POC
22
+
### Proof of Concept (POC) 🚀
23
23
24
24
Today I will do a quick proof of concept. I will use an open source that provide this functionality, there are a lot,
25
25
26
-
#### Some of Open source solutions
26
+
Today, I'll do a quick proof of concept (POC) to explore authorization management. I'll use an open-source solution that provides this functionality
27
+
28
+
there are plenty of options available.
29
+
30
+
#### Some of Open-Source solutions 🛠️
27
31
- perimfy
28
32
- openfga
29
33
- casbin
30
34
- topaz
31
35
32
-
#### Cloud solutions
36
+
#### Cloud solutions ☁️
33
37
- there are good cloud solutions like [Permit.io](https://www.permit.io)
34
38
35
-
For today poc I will use[Permify](https://permify.co/).
39
+
For today's POC, I'll be using[Permify](https://permify.co/). ✅
@@ -47,9 +51,11 @@ For today poc I will use [Permify](https://permify.co/).
47
51

48
52
---
49
53
50
-
3. Created our schema, I used here the traditional RBAC model for simplicity. but in the real world and complex apps, there are a lot of models for complex use cases. Actually, Permify is considered as fine-grained access control service inspired by `Google’s Zanzibar`.
54
+
3. Created our schema, using the traditional RBAC model for simplicity 🔧. However, in real-world, complex applications, there are many models designed to handle complex use cases.
55
+
56
+
In fact, **Permify** is considered as fine-grained access control service, inspired by `Google’s Zanzibar`. 🌐 This allows for more detailed and flexible permission management, making it suitable for more complex scenarios.
51
57
52
-
Permify has a gread article about their solution [Here](https://docs.permify.co/permify-overview/authorization-service)
58
+
**Permify** has a great article about their solution [Here](https://docs.permify.co/permify-overview/authorization-service)
0 commit comments