logoalt Hacker News

henryfjordanlast Friday at 5:51 PM4 repliesview on HN

An AuthN/Z system would probably end looking like counterexample #2, which immediately raised a red flag for me about the article.


Replies

Alupislast Saturday at 12:27 AM

There's no particular reason an Auth system must be designed like counterexample #2. There's many ways to design that system and avoid cycles. You can leverage caching of role information - propagated via messages/bus, JWT's with roles baked-in and IDP's you trust, etc. Hitting an Auth service for every request is chaotic and likely a source of issue.

show 1 reply
davewritescodelast Saturday at 12:22 AM

There’s a million reasonable situations where this pattern could arise because of you want to encapsulate a domain behind a micro service.

Take the simplest case of a CRM system a service provides search/segmentation and CRUD on top of customer lists. I can think of a million ways other services could use that data.

waterprooflast Friday at 6:50 PM

Yeah if services can't be used by multiple other services, then what's the point?

show 2 replies