Module 12
Architectural patterns for securing distributed systems: federated identity, gatekeeper, valet key, and token-based authentication flows.
Delegate authentication to external identity providers: SAML, OIDC, SSO flows, identity federation across organizational boundaries.
A dedicated host that validates and sanitizes requests before forwarding to backend services: defense in depth, DMZ architecture, and request filtering.
Grant clients direct but scoped access to resources: pre-signed URLs, SAS tokens, temporary credentials, and minimizing proxy bottlenecks.
Architectural view of JWT and OAuth2: token issuance, validation, refresh flows, token storage, and securing microservice-to-microservice communication.
Generating, rotating, scoping, and revoking API keys: key hierarchies, rate limiting per key, usage analytics, and key storage best practices.