Securing Requests with Keycloak and Istio through Request-Level Authentication
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore request-level authentication using Keycloak and Istio in this informative 26-minute conference talk presented by the Cloud Native Computing Foundation (CNCF). Learn how to enhance security for microservices and cloud-native applications by implementing robust authentication mechanisms. Discover the integration of Keycloak, an open-source identity and access management solution, with Istio, a powerful service mesh platform, to achieve fine-grained access control at the request level. Gain insights into best practices for securing your distributed systems and protecting sensitive data in cloud-native environments.
Syllabus
Securing Requests with Keycloak and Istio through Request-Level Authentication
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Cloud Security Risks: Identify and Protect Against ThreatsGoogle Cloud via Coursera Kubernetes and Cloud Native Security Associate (KCSA) Cert Prep
LinkedIn Learning 12 Essential Requirements for Policy Enforcement and Governance with OSCAL
CNCF [Cloud Native Computing Foundation] via YouTube Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube A 10-Step Guide for Integrating Security Metrics Into Your Observability Stack
CNCF [Cloud Native Computing Foundation] via YouTube