YoVDO

How the DoD Use Istio for End-to-End Encryption and Authentication

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Istio Courses End-to-End Encryption Courses Single Sign-On (SSO) Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how the Department of Defense leverages Istio for enhanced security in this 43-minute conference talk. Dive into the practical implementation of service mesh technology for encryption in transit and end-user authentication via SSO across DoD applications. Discover the challenges and design considerations in deploying the Istio ecosystem's authservice, which simplifies SSO integration for Platform One application teams. Learn about the standard mesh use case, Envoy filters, and the "Hello World" example. Gain insights into ongoing improvements, open-source developments, and future steps in service mesh adoption for authentication and authorization, including an upcoming NIST IR on the subject.

Syllabus

Intro
Agenda
Platform 1 Overview
Standard Mesh Use Case
SSO for Free
Auth Service
Envoy Filter
Service Mesh
Hello World
Improvements
Challenges
OSS
Next Steps


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Sicher per E-Mail kommunizieren - Mitleser unerwünscht
openHPI
Introduction to Data Security Course (How To)
Treehouse
QuickChat 2.0 (WhatsApp like chat) iOS10 and Swift 3
Udemy
iOS 12 Chat Application like WhatsApp and Viber
Udemy
End-to-End Encryption - Behind the Scenes
Strange Loop Conference via YouTube