© Rahul Sharma, Avinash Singh 2020
Rahul Sharma and Avinash SinghGetting Started with Istio Service Meshhttps://doi.org/10.1007/978-1-4842-5458-5_9

9. Policies and Rules

Rahul Sharma and Avinash Singh2
Delhi, India
Gurgaon, Haryana, India
Application security is challenge in a microservice architecture. Developers build business process microservices in various languages. All these applications must be secured with the proper authentication and authorization. Most enterprises have one way of doing authentication and authorization. In this chapter, we will discuss the security features provided in Istio. Previously we saw that every Istio feature is driven by the Envoy proxy. Security is no exception to this. Istio provides security features ...

Get Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.