Spring Cloud Security


Table of Contents

1. Quickstart
1.1. OAuth2 Single Sign On
1.2. OAuth2 Protected Resource
2. More Detail
2.1. Single Sign On
2.2. Token Relay
2.2.1. Client Token Relay
2.2.2. Client Token Relay in Zuul Proxy
2.2.3. Resource Server Token Relay
3. Configuring Authentication Downstream of a Zuul Proxy