Securing gRPC Endpoints with Single Sign-on

When we deploy any type of application, we usually need to restrict certain functionalities within it. To do so, we use two different techniques: authentication and authorization. Authentication is when the user proves that they are who they say they are. For example, authentication is successful when the user has applied the correct combination of the username and password. Authorization is the process of restricting access based on permissions. For example, if a user is authenticated, the user still may not be allowed to access some resources that require special permissions.

Get hands-on with 1200+ tech skills courses.