I have developed a shell application that serves as the main container for handling all API communications. Additionally, I have created several Micro applications that simply send API request signals to the shell application.
When it comes to security, my concern is how the shell application can verify that the API request signal is originating from a trusted micro app that belongs to me.
In simpler terms, I want to know if there is a method for the shell application to recognize that the signal is indeed being sent by one of its owned micro apps and not from an untrusted source such as hackers or XSS attacks.