This article is the fourth in a series of articles about authentication and authorization in a microservice architecture. The complete series is: Overview of authentication and authorization in a microservice architecture Implementing authentication Implementing JWT-based authorization Implementing authorization using fetch and replicate Implementing complex authorization using Oso Cloud - part 1 Implementing complex authorization using Oso Cloud - part 2 In Part 3 - implementing authorizatio...