This is used for respect web services architecture:
- protect request from user management by checking authorization header if token is insert in request to allow request
from authentication service:
1 step: check token while executing the request:
2 step: check if the token is valid, allow request if token valid, and not allow request if token expired
3 allow user to disable the middleware by a webservice (Optional)
Got pratice from this website talking about' microservices architecture)[https://microservices.io/patterns/communication-style/messaging.html]
This is used for respect web services architecture:
from authentication service:
1 step: check token while executing the request:
2 step: check if the token is valid, allow request if token valid, and not allow request if token expired
3 allow user to disable the middleware by a webservice (Optional)
Got pratice from this website talking about' microservices architecture)[https://microservices.io/patterns/communication-style/messaging.html]