© Rahul Sharma, Avinash Singh 2020Rahul Sharma and Avinash SinghGetting Started with Istio Service Meshhttps://doi.org/10.1007/978-1-4842-5458-5_9
9. Policies and Rules
Rahul Sharma1 and Avinash Singh2
Gurgaon, Haryana, India
Application security is challenge in a microservice architecture. Developers build business process microservices in various languages. All these applications must be secured with the proper authentication and authorization. Most enterprises have one way of doing authentication and authorization. In this chapter, we will discuss the security features provided in Istio. Previously we saw that every Istio feature is driven by the Envoy proxy. Security is no exception to this. Istio provides security features ...