0
0
Microservicessystem_design~20 mins

Centralized vs distributed auth in Microservices - Practice Questions

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Auth Mastery Badge
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Centralized Authentication
In a microservices system using centralized authentication, what is the main role of the authentication server?
AIt issues tokens and validates user credentials for all services.
BEach microservice independently verifies user credentials.
CIt stores user data but does not handle token issuance.
DIt only logs authentication attempts without validating users.
Attempts:
2 left
💡 Hint
Think about where the user login happens and who trusts the tokens.
Architecture
intermediate
2:00remaining
Distributed Authentication Token Validation
In a distributed authentication system, how do microservices typically validate user tokens without a central server?
ATokens are not validated; services trust all requests.
BServices send token validation requests to a central database.
CServices require users to re-login for each service.
DEach service uses a shared secret or public key to verify token signatures locally.
Attempts:
2 left
💡 Hint
Think about how services can trust tokens without asking a central server every time.
scaling
advanced
2:00remaining
Scaling Challenges of Centralized Authentication
What is a major scaling challenge when using centralized authentication in a large microservices environment?
AThe authentication server can become a bottleneck and single point of failure.
BMicroservices cannot share user data easily.
CUsers must authenticate separately for each microservice.
DTokens cannot be revoked once issued.
Attempts:
2 left
💡 Hint
Consider what happens if many services rely on one server for login.
tradeoff
advanced
2:00remaining
Tradeoffs Between Centralized and Distributed Auth
Which tradeoff best describes the difference between centralized and distributed authentication in microservices?
ACentralized auth requires no tokens; distributed auth requires tokens for every request.
BCentralized auth simplifies token management but risks bottlenecks; distributed auth improves scalability but adds complexity.
CCentralized auth is always faster; distributed auth is always slower.
DCentralized auth cannot support multiple user types; distributed auth can.
Attempts:
2 left
💡 Hint
Think about simplicity versus scalability and complexity.
estimation
expert
2:00remaining
Estimating Token Validation Load in Distributed Auth
A microservices system has 100 services and 10,000 users making 1 request per second each. If each service validates tokens locally, approximately how many token validations happen per second across the system?
A100,000 validations per second
B10,000 validations per second
C1,000,000 validations per second
D100 validations per second
Attempts:
2 left
💡 Hint
Multiply users, requests per second, and number of services involved per request.