Table of Contents |
---|
Context
Jira Story
https://issuesfolio-org.folioatlassian.orgnet/browse/MODINREACH-20
Spike goals
Investigate possible methods (ways) to implement OAuth2 authorization
Terminologies
...
Protected resource – some data that needs to be accessed, it needs to be secured and only accessible to requests with a valid JWT access token. In our case it’s mod-inn-reach or inn-reach-edge REST endpoints.
...