YoVDO

Securing Requests with Keycloak and Istio through Request-Level Authentication

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Microservices Security Courses Distributed Systems Courses Istio Courses Identity and Access Management Courses Service Mesh Courses Keycloak Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore request-level authentication using Keycloak and Istio in this informative 26-minute conference talk presented by the Cloud Native Computing Foundation (CNCF). Learn how to enhance security for microservices and cloud-native applications by implementing robust authentication mechanisms. Discover the integration of Keycloak, an open-source identity and access management solution, with Istio, a powerful service mesh platform, to achieve fine-grained access control at the request level. Gain insights into best practices for securing your distributed systems and protecting sensitive data in cloud-native environments.

Syllabus

Securing Requests with Keycloak and Istio through Request-Level Authentication


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Cloud Security Risks: Identify and Protect Against Threats
Google Cloud via Coursera
Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
LinkedIn Learning
12 Essential Requirements for Policy Enforcement and Governance with OSCAL
CNCF [Cloud Native Computing Foundation] via YouTube
Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube
A 10-Step Guide for Integrating Security Metrics Into Your Observability Stack
CNCF [Cloud Native Computing Foundation] via YouTube