Skip to Main Content
Istio in Action
book

Istio in Action

by Rinor Maloku, Christian E. Posta
March 2022
Intermediate to advanced content levelIntermediate to advanced
480 pages
13h 18m
English
Manning Publications
Content preview from Istio in Action

appendix C. Istio security: SPIFFE

C.1 Authentication using PKI (public key infrastructure)

Authentication of communicating parties on the World Wide Web is done using digitally signed certificates provisioned by a public key infrastructure (PKI). The PKI is a framework that defines the process of providing the server (such as a web app) with a digital certificate to prove its identity and providing the client with the means of verifying the validity of the digital certificate. To dive deeper into how the PKI works, check out https://www.securew2.com/blog/public-key-infrastructure -explained.

The certificates provisioned by the PKI have a public key and a private key. The public key is contained in the certificate presented to the client as a ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

gRPC: Up and Running

gRPC: Up and Running

Kasun Indrasiri, Danesh Kuruppu
Learning OpenTelemetry

Learning OpenTelemetry

Ted Young, Austin Parker

Publisher Resources

ISBN: 9781617295829Supplemental ContentPublisher SupportOtherPublisher WebsiteSupplemental ContentPurchase Link