Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
Compliance als Vorteil: Technische Anforderungen der GDPR für moderne digitale UnternehmenOct 24, 201710:00 Uhr
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
KuppingerCole in the press
For Oracle, the Future Is Autonomous
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Or sign in with
As opposed to traditional monolithic applications, a (micro)service-based architecture comprises multiple loosely coupled modules (“services”) that serve specific business purposes and communicate over lightweight network protocols. Such services can be developed, deployed and scaled independently on different platforms, which greatly reduces the time needed to bring as new product to market and allows for continuous delivery development process, where small changes to the business logic of an individual service can be quickly introduced and deployed.
However, when designing a (micro)-service architecture, dealing with identity and security becomes a much more complicated task than in traditional monolithic applications: each individual component must know which user is interacting with it and which access rights are granted to him. Externalizing and centralizing access management is a natural choice for microservices systems to ensure consistently secure and scalable authorization. Implementing the authorization service itself as a microservice, providing policy-driven access control for other microservices and APIs seems to be just as natural… Or is it?
Language: English • Duration: 53:28 • Resolution: 1280x720
Executive View: Entrust IdentityGuard for Enterprise - 71321
Whitepaper: TechDemocracy: Moving towards a holistic Cyber Risk Governance approach - 70360
Leadership Brief: Why Adaptive Authentication Is A Must - 72008
Executive View: Ubisecure Identity Server - 70838
Executive View: Axiomatics Data Security - 70345
Operational Technology, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Adaptive Authentication & Authorization
Entitlement & Access Governance