You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One of the de facto standards of tackling how decoupled systems interact together is by building APIs. In recent years, GraphQL and Jamstack solutions has gained popularity in developing experiencs. GraphQL spec uses a declarative query language that favors flexible queries to your client's demands. On the backend, you create a strongly typed schema to resolve data so the clients can send arbitrary queries for the exact data they want, which you will validate against your schema.
This article will explain how we can leverage various authorization strategies in a Jamstack architecture.
Goals
We will build an authorization system with GraphQL and discuss how this can be implemented in a Jamstack architecture.
Outline
What is Jamstack?
Role based access controls
Attribute based access controls
Authorization at resolvers
App-wide authorization
Authorization at the data layers
Global authorization with Cerbos - a tool that turns authorization logic into configuration
Best practices
Conclusion
Sample articles
No response
The text was updated successfully, but these errors were encountered:
Reason for thought about this: Webiny heavily relies on GraphQL. Creating content around GraphQL is helpful to the end user in my opinion and how they approach the platform.
Introduction
One of the de facto standards of tackling how decoupled systems interact together is by building APIs. In recent years, GraphQL and Jamstack solutions has gained popularity in developing experiencs. GraphQL spec uses a declarative query language that favors flexible queries to your client's demands. On the backend, you create a strongly typed schema to resolve data so the clients can send arbitrary queries for the exact data they want, which you will validate against your schema.
This article will explain how we can leverage various authorization strategies in a Jamstack architecture.
Goals
We will build an authorization system with GraphQL and discuss how this can be implemented in a Jamstack architecture.
Outline
Sample articles
No response
The text was updated successfully, but these errors were encountered: