LIGHT

  • News
  • Docs
  • Community
  • Reddit
  • GitHub

Hazelcast Security

The light-oauth2 consists of 8 microservices and these services communicate between each other through a Hazelcast distributed cache. All services are working at the cache layer so that it is very easy to abstract the persistence layer to any database. Currently, we only support MySQL, Postgres, Oracle, and SQLServer. And these can be exchanged by configuration. User can extend the persistence layer to support other SQL or No-SQL database.

By working at the Data Grid level, we can hide the persistence from the services. At the same time, it significantly improves the performance of light-oauth2 services. However, there are some extra configurations we have to consider to secure the Hazelcast.

When talking about Hazelcast security, there are two different areas:

Authentication/Authorization - which application can connect to the Hazelcast IMDG and client permission.

For more information, please visit https://github.com/hazelcast/hazelcast/issues/8370

Multicast Security - Ensure nobody can intercept the network traffic. It requires TLS to encrypt the connection.

Hazelcast enterprise has features to meet the security requirement above; however, most of our users won’t want to buy the enterprise license. So we have to find a way to secure the Hazelcast at the network level.

The light-oauth2 is an infrastructure service, and it is normally not recommended deploying to the Kubernetes cluster; however, more and more users are doing so. So let’s separate the deployment from VM and Kubernetes/Openshift.

VM deployment

When deploying the light-oauth2 to one or several VMs, you can start the containers with docker-compose or docker-swarm. These VMs are secured by firewalls so that Hazelcast communication can only be allowed between these VMs. Only the service ports should be exposed to the outside through either static IP with port numbers or through Consul service registry and discovery.

Kubernetes/Openshift

When deploying the light-oauth2 to a Kubernetes/Openshift cluster, it is recommended deploying light-oauth2 services to a separate cluster so that these nodes can be secured, or at least deploying to a separate namespace/project so that security can be configured separately.

The network policy configuration in Kubernetes can be found at https://kubernetes.io/docs/concepts/services-networking/network-policies/#the-networkpolicy-resource, and we will write some tutorial in the future.

  • About Light
    • Overview
    • Testimonials
    • What is Light
    • Features
    • Principles
    • Benefits
    • Roadmap
    • Community
    • Articles
    • Videos
    • License
    • Why Light Platform
  • Getting Started
    • Get Started Overview
    • Environment
    • Light Codegen Tool
    • Light Rest 4j
    • Light Tram 4j
    • Light Graphql 4j
    • Light Hybrid 4j
    • Light Eventuate 4j
    • Light Oauth2
    • Light Portal Service
    • Light Proxy Server
    • Light Router Server
    • Light Config Server
    • Light Saga 4j
    • Light Session 4j
    • Webserver
    • Websocket
    • Spring Boot Servlet
  • Architecture
    • Architecture Overview
    • API Category
    • API Gateway
    • Architecture Patterns
    • CQRS
    • Eco System
    • Event Sourcing
    • Fail Fast vs Fail Slow
    • Integration Patterns
    • JavaEE declining
    • Key Distribution
    • Microservices Architecture
    • Microservices Monitoring
    • Microservices Security
    • Microservices Traceability
    • Modular Monolith
    • Platform Ecosystem
    • Plugin Architecture
    • Scalability and Performance
    • Serverless
    • Service Collaboration
    • Service Mesh
    • SOA
    • Spring is bloated
    • Stages of API Adoption
    • Transaction Management
    • Microservices Cross-cutting Concerns Options
    • Service Mesh Plus
    • Service Discovery
  • Design
    • Design Overview
    • Design First vs Code First
    • Desgin Pattern
    • Service Evolution
    • Consumer Contract and Consumer Driven Contract
    • Handling Partial Failure
    • Idempotency
    • Server Life Cycle
    • Environment Segregation
    • Database
    • Decomposition Patterns
    • Http2
    • Test Driven
    • Multi-Tenancy
    • Why check token expiration
    • WebServices to Microservices
  • Cross-Cutting Concerns
    • Concerns Overview
  • API Styles
    • Light-4j for absolute performance
    • Style Overview
    • Distributed session on IMDG
    • Hybrid Serverless Modularized Monolithic
    • Kafka - Event Sourcing and CQRS
    • REST - Representational state transfer
    • Web Server with Light
    • Websocket with Light
    • Spring Boot Integration
    • Single Page Application
    • GraphQL - A query language for your API
    • Light IBM MQ
    • Light AWS Lambda
    • Chaos Monkey
  • Infrastructure Services
    • Service Overview
    • Light Proxy
    • Light Mesh
    • Light Router
    • Light Portal
    • Messaging Infrastructure
    • Centralized Logging
    • COVID-19
    • Light OAuth2
    • Metrics and Alerts
    • Config Server
    • Tokenization
    • Light Controller
  • Tool Chain
    • Tool Chain Overview
  • Utility Library
  • Service Consumer
    • Service Consumer
  • Development
    • Development Overview
  • Deployment
    • Deployment Overview
    • Frontend Backend
    • Linux Service
    • Windows Service
    • Install Eventuate on Windows
    • Secure API
    • Client vs light-router
    • Memory Limit
    • Deploy to Kubernetes
  • Benchmark
    • Benchmark Overview
  • Tutorial
    • Tutorial Overview
  • Troubleshooting
    • Troubleshoot
  • FAQ
    • FAQ Overview
  • Milestones
  • Contribute
    • Contribute to Light
    • Development
    • Documentation
    • Example
    • Tutorial
“Hazelcast Security” was last updated: July 5, 2019: fixes #119 add light-oauth2 hazelcast security (84927a4)
Improve this page
  • News
  • Docs
  • Community
  • Reddit
  • GitHub
  • About Light
  • Getting Started
  • Architecture
  • Design
  • Cross-Cutting Concerns
  • API Styles
  • Infrastructure Services
  • Tool Chain
  • Utility Library
  • Service Consumer
  • Development
  • Deployment
  • Benchmark
  • Tutorial
  • Troubleshooting
  • FAQ
  • Milestones
  • Contribute