Mastering Development

Microservices authorization where it should take place?

I have discussions at work for authorization, and we have different opinions about what it should look like. I would like to ask StackOverflow community which approach is correct because I can’t find myself. We’re creating a new project. We will use: kong as a proxy keycloak as an identity provider. The user in the […]