As a developer you should ask yourself: "How can I make my application (more) secure?"
In this workshop you will learn how to get started with Application Security from two perspectives:
Authentication and Authorization implementation
We will show you with an example application:
How to secure external access to a Kubernetes cluster with TLS
How to secure communication between Microservices with Istio and mTLS
How to implement authorization and authentication with the Open Source Identity and Access Management system Keycloak and JSON Web Tokens (JWT)
The exercises are based on an example application based on our Open Source Github project Cloud Native Starter, build with Quarkus and Microprofile
The following screenshot shows the web application, you have to logon to see the list of articles.
To see the results in the web application, users need to be authenticated and they need to have the role
After you complete this workshop, you'll understand the following application security related topics:
Application security provided by the platform
Application security with Keycloak and Quarkus
Authentication with Keycloak on the Web Fronted
Authorization in Quarkus for specific Microservices in the backend
The scope of this workshop is not to explain every aspect of application security.
These are the sections of this workshop, go through all of them in sequence, start with
1. Setup the IBM Cloud Environment :
This workshop has been tested on the following platforms:
IBM Cloud Kubernetes Service: Kubernetes Version 1.17, Istio Version 1.5 on IBM Cloud
IBM Cloud Shell: Version 1.0.2
Here are some blogs that describe how this project has been implemented-
The presentation that goes with this workshop is available here.