Skip to content

Security & auth

Authentication flows, trust boundaries, secret handling.

OAuth 2 authorization code

The browser-assisted flow for third-party login. The client never sees the resource owner's password.

JWT verification

Tokens flow through the gateway. Downstream services trust the token because the gateway verified it against the auth service.

mTLS between services

Both sides present certificates. The mesh / sidecar rotates them automatically so app code never sees them. The trust boundary is made visible as a region.

Zero trust network access

Every request is verified regardless of network origin. There's no "inside" vs "outside" the firewall.

Edit this pageLast updated: