Identity and Access
Making sure only users and systems that should have access are authenticated and have the correct authorization is considered its own bounded context. We will rely on third party software based on open standards for dealing with this.
Actors
As part of the project, there are certain actors that have been defined. These are the same as the roles they play and is what governs authorization. You will find this as part of the token and concretely the application role claim.
Standards
OAUTH2 + OpenID
JWT Tokens
Azure Active Directory
B2C
Single Sign On
Identity Server
As part of development, there is need to be able to have an end to end scenario without having access to all that is in the cloud. Identity Server plays an important role in this and you’ll find the source for it here. It is also packaged into a Docker image and put here.