In recent years, microservices architecture has become the predominant model for software manufacturing. However, these types of architectures must face security challenges typical of distributed environments. This study focuses on identify an authorization strategy compatible with applications based on microservices and verify their operation by preparing a proof of concept.