Introduction

As a developer you should ask yourself: "How can I make my application (more) secure?"

In this workshop you will learn how to get started with Application Security from two perspectives:

  • Platform security

  • Authentication and Authorization implementation

We will show you with an example application:

  • How to secure external access to a Kubernetes cluster with TLS

  • How to secure communication between Microservices with Istio and mTLS

  • How to implement authorization and authentication with the Open Source Identity and Access Management system Keycloak and JSON Web Tokens (JWT)

The exercises are based on an example application based on our Open Source Github project Cloud Native Starter, build with Quarkus and Microprofile

The following screenshot shows the web application, you have to logon to see the list of articles.

Architecture

The following diagram shows the architecture of the sample application. There is a Web-App service that serves the Javascript/Vue.js code to the browser. The Web-App code running in the browser invokes a REST API of the Web-API microservice. The Web-API microservice in turn invokes a REST API of the Articles microservice.

To see the results in the web application, users need to be authenticated and they need to have the role user.

Estimated time and level

Time

Level

one hour

beginners

Objectives

After you complete this workshop, you'll understand the following application security related topics:

Application security provided by the platform

Application security with Keycloak and Quarkus

The scope of this workshop is not to explain every aspect of application security.

About this workshop

Agenda

These are the sections of this workshop, go through all of them in sequence, start with 1. Setup the IBM Cloud Environment :

Compatibility

This workshop has been tested on the following platforms:

  • IBM Cloud Kubernetes Service: Kubernetes Version 1.17, Istio Version 1.5 on IBM Cloud

  • IBM Cloud Shell: Version 1.0.2

Technology Used

Credits

Additional resources

Here are some blogs that describe how this project has been implemented-

The presentation that goes with this workshop is available here.