Application security is challenge in a microservice architecture. Developers build business process microservices in various languages. All these applications must be secured with the proper authentication and authorization. Most enterprises have one way of doing authentication and authorization. In this chapter, we will discuss the security features provided in Istio. Previously we saw that every Istio feature is driven by the Envoy proxy. Security is no exception to this. Istio provides security features using the ...
9. Policies and Rules
Get Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.