Step 10: Security

Navigation: Main Index | ← Step 9: Observability | Step 11: Trade-offs →


Overview

This step covers authentication, authorization, encryption, and security best practices for system design.


Topics Covered

1. Tokens for Authentication

  • JWT tokens
  • Token-based authentication
  • Refresh tokens
  • Security considerations

2. SSO & OAuth

  • Single Sign-On
  • OAuth 2.0 flow
  • OpenID Connect
  • Implementation patterns

3. Access Control List & Rule Engines

  • RBAC, ABAC
  • Policy engines
  • Fine-grained access control
  • Implementation

4. Encryption & Its Types

  • Symmetric vs asymmetric encryption
  • TLS/SSL
  • Encryption at rest vs in transit
  • Key management

Quick Navigation

TopicFileKey Concepts
Tokenstokens-authentication.mdJWT, refresh tokens, security
SSO & OAuthsso-oauth.mdOAuth 2.0, OpenID Connect, SSO
ACL & Rulesacl-rule-engines.mdRBAC, ABAC, policy engines
Encryptionencryption.mdTLS, symmetric, asymmetric, keys

Previous Step: Step 9: Observability ←

Next Step: Step 11: Trade-offs →

Back to: Main Index