Securing Requests with Keycloak and Istio through Request-Level Authentication
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore request-level authentication using Keycloak and Istio in this informative 26-minute conference talk presented by the Cloud Native Computing Foundation (CNCF). Learn how to enhance security for microservices and cloud-native applications by implementing robust authentication mechanisms. Discover the integration of Keycloak, an open-source identity and access management solution, with Istio, a powerful service mesh platform, to achieve fine-grained access control at the request level. Gain insights into best practices for securing your distributed systems and protecting sensitive data in cloud-native environments.
Syllabus
Securing Requests with Keycloak and Istio through Request-Level Authentication
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Building on Microsoft Sentinel PlatformMicrosoft via YouTube Securing Applications and Infrastructure on Kubernetes with Sysdig
Mirantis via YouTube Container Escape in 2021
Hack In The Box Security Conference via YouTube Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube Controlled Mayhem With Cloud Native Security Pipelines
OWASP Foundation via YouTube