YoVDO

How the DoD Use Istio for End-to-End Encryption and Authentication

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Istio Courses End-to-End Encryption Courses Single Sign-On (SSO) Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how the Department of Defense leverages Istio for enhanced security in this 43-minute conference talk. Dive into the practical implementation of service mesh technology for encryption in transit and end-user authentication via SSO across DoD applications. Discover the challenges and design considerations in deploying the Istio ecosystem's authservice, which simplifies SSO integration for Platform One application teams. Learn about the standard mesh use case, Envoy filters, and the "Hello World" example. Gain insights into ongoing improvements, open-source developments, and future steps in service mesh adoption for authentication and authorization, including an upcoming NIST IR on the subject.

Syllabus

Intro
Agenda
Platform 1 Overview
Standard Mesh Use Case
SSO for Free
Auth Service
Envoy Filter
Service Mesh
Hello World
Improvements
Challenges
OSS
Next Steps


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube