International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 187 - Issue 28 |
Published: August 2025 |
Authors: Gogulakrishnan Thiyagarajan, Vinay Bist, Prabhudarshi Nayak |
![]() |
Gogulakrishnan Thiyagarajan, Vinay Bist, Prabhudarshi Nayak . Strengthening gRPC Security in Microservices: A Proxy-Based Approach for mTLS, JWT, and RBAC Enforcement. International Journal of Computer Applications. 187, 28 (August 2025), 1-17. DOI=10.5120/ijca2025925359
@article{ 10.5120/ijca2025925359, author = { Gogulakrishnan Thiyagarajan,Vinay Bist,Prabhudarshi Nayak }, title = { Strengthening gRPC Security in Microservices: A Proxy-Based Approach for mTLS, JWT, and RBAC Enforcement }, journal = { International Journal of Computer Applications }, year = { 2025 }, volume = { 187 }, number = { 28 }, pages = { 1-17 }, doi = { 10.5120/ijca2025925359 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2025 %A Gogulakrishnan Thiyagarajan %A Vinay Bist %A Prabhudarshi Nayak %T Strengthening gRPC Security in Microservices: A Proxy-Based Approach for mTLS, JWT, and RBAC Enforcement%T %J International Journal of Computer Applications %V 187 %N 28 %P 1-17 %R 10.5120/ijca2025925359 %I Foundation of Computer Science (FCS), NY, USA
As microservices architecture gains mainstream acceptance, security for inter-service communication has become a top priority. gRPC, a widely used high-performance remote procedure call (RPC) framework, enables efficient communication but lacks inherent strong security capabilities, exposing microservices to unauthorized access, data interception, and authentication misconfiguration. To mitigate these challenges, this paper suggests deploying a gRPC Security Proxy that combines mutual TLS (mTLS), JSON Web Token (JWT) authentication, and Role-Based Access Control (RBAC). This combination aims to provide end-to-end encryption, strong identity verification, and fine-grained access control. In contrast to service meshes like Istio and Envoy, which add operational overhead and necessitate massive configuration amounts, the proposed proxy offers a lightweight and easily integrable alternative. It simplifies certificate management, enforces authentication per request, and provides policy consistency for microservices. By incorporating security features at the proxy level, the system eliminates the need for developers to integrate security logic into individual services, thereby lessening operational overhead and the risk of security misconfigurations. Although the solution provides significant benefits from the security and manageability perspectives, some limitations may arise, like scalability in high-traffic setups and reliance on external identity providers for JWT verification. Future evolution can investigate the possibility of dynamic policy adjustment, automated token management, and real-time security monitoring, further enhancing its capabilities. This framework provides a developer-friendly, scalable, and secure communication solution, a highly feasible method for organizations that want to improve gRPC security without compromising agility or performance.