Copyright (C) 2024 Ionut Balosin
This project is licensed under the Apache License, Version 2.0. Please see the LICENSE file for full license.
⏰ 40 minutes
👨💼 Conducted By Trainer
This software architecture diagram for the Pizza
distributed application highlights key security aspects, including OAuth 2.0 flows (e.g., Token introspection, JWKS) and endpoint roles checks.
Note: Please ensure that the Docker daemon is running; otherwise, the commands will not execute successfully.
-
Open a terminal and start the
Pizza
application, which includes multiple microservices running in Docker, by using the following command:./bootstrap-pizza-application.sh
-
Next, open
Postman
and import the Postman collections. -
From the provided
Postman
collections, choose one of the following OAuth 2.0 flows to obtain a proper JWT token:Password Flow
Client Credentials Flow
Authorization Code Flow with PKCE
(using the credentialsdemo_user:Test1234!
) (recommended)
-
Finally, initiate a pizza order request using the endpoint
POST /pizza/orders
. If the command succeeds, the response should be201 Created
. -
To view further request processing details, open the console logs of each Docker container by running:
docker logs -f <CONTAINER_ID>
where
<CONTAINER_ID>
can be retrieved by running:docker ps -a
-
Additionally, to better understand the
Token Introspection
,JSON Web Key Set
, androles-based access control
implementations, please check out the following modules: