Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.14 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
The increasing use of microservice has put additional strain on scalable secure API authorization frameworks/pipelines. Breach of OAuth 2.0 OAuth 2.0 is an increasingly used form of delegated authentication that introduces numerous integration challenges to Spring-based applications, especially in terms of token validation, token lifecycle and inter-service trust. This survey offers an assessment of JWT, introspection and hybridization models, validation techniques and trade-offs in conducting experiments. The article presents the weakness of revocation processes which is normally inequality in the implementation besides insecure key distribution. It proposes theoretical models and presents the analysis that empirically provides the comparative point of view that attempts to bridge the implementation-practice gap in ventilating security settings of enterprise.
Keywords:
OAuth 2.0, Microservices, Spring Security, JWT, Token introspection, Secure API design, Access control, Authorization server, Token revocation, Zero Trust architecture
Cite Article:
"Security-First API Design with OAuth 2.0 in Spring-Based Microservices", International Journal for Research Trends and Innovation (www.ijrti.org), ISSN:2455-2631, Vol.10, Issue 5, page no.d268-d272, May-2025, Available :http://www.ijrti.org/papers/IJRTI2505337.pdf
Downloads:
000343
ISSN:
2456-3315 | IMPACT FACTOR: 8.14 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.14 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator