Distributed Application Architecture Patterns

9 Security Patterns

Security is a broad topic and many patterns have been created to address it, such as in [147]. However, while most of them do pertain to distributed systems, few are focused on the architecture of the system itself. This chapter presents a few useful patterns for enhancing the security of a distributed system directly through its architecture.

  1. The Identity Provider & Federated Identity patterns in § 9.1 shows two common ways to handle authentication and authorization in a distributed system

  2. The Gatekeeper pattern in § 9.2 instead uses distribution to its advantage to isolate security incidents in a limited environment

Other patterns that could be considered part of this category include [148]:

Notable omissions in this category due to the methodology described in § 1 include: