Skip to Main Content
Istio in Action
book

Istio in Action

by Rinor Maloku, Christian E. Posta
March 2022
Intermediate to advanced content levelIntermediate to advanced
480 pages
13h 18m
English
Manning Publications
Content preview from Istio in Action

9 Securing microservice communication

This chapter covers

  • Handling service-to-service authentication and authorization in the service mesh
  • Handling end-user authentication and authorization

In chapter 4, we covered admitting traffic into the mesh, including some ways to secure that traffic. Here, we take a closer look at transparently improving the security posture of a services-based architecture by using the capabilities of the service mesh.

Istio is secure by default. In this chapter, we see what that means, how it works, how service-to-service and end-user authentication are implemented, and the access control we have over services in the service mesh. Before getting to the features, we give a brief refresher of security topics; see appendix ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

gRPC: Up and Running

gRPC: Up and Running

Kasun Indrasiri, Danesh Kuruppu
Learning OpenTelemetry

Learning OpenTelemetry

Ted Young, Austin Parker

Publisher Resources

ISBN: 9781617295829Supplemental ContentPublisher SupportOtherPublisher WebsiteSupplemental ContentPurchase Link