Service A accesses a legacy system. There is a requirement to secure Service A so that it can only be accessed by authorized service consumers. The current service architecture doesn't allow the delegation of service consumer credentials to the legacy system. Which pattern needs to be applied in order to fulfill this security requirement?
Dalene
4 months agoEdna
4 months agoCarol
4 months agoJettie
4 months agoVivan
5 months agoMirta
5 months agoJamie
5 months agoJamal
5 months ago