173 Views
Posts in this series: A Case StudyDesigning Authentication SchemesIn our last post, I walked through my real-world scenario of needing to follow Zero Trust principles in securing microservice-based APIs inside (and outside) Azure. For our sample system, I'll simplify it a bit so that we have three applications: Server hosted
0 comments