This article is the third in a series of articles about authentication and authorization in a microservice architecture. The complete series is: Overview of authentication and authorization in a microservice architecture Implementing authentication Implementing JWT-based authorization Developing complex authorization Implementing complex authorization using Oso Cloud - part 1 Implementing complex authorization using Oso Cloud - part 2 The previous article described how to implement authentica...