YoVDO

Securing Requests with Keycloak and Istio through Request-Level Authentication

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Microservices Security Courses Distributed Systems Courses Istio Courses Identity and Access Management Courses Service Mesh Courses Keycloak Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore request-level authentication using Keycloak and Istio in this informative 26-minute conference talk presented by the Cloud Native Computing Foundation (CNCF). Learn how to enhance security for microservices and cloud-native applications by implementing robust authentication mechanisms. Discover the integration of Keycloak, an open-source identity and access management solution, with Istio, a powerful service mesh platform, to achieve fine-grained access control at the request level. Gain insights into best practices for securing your distributed systems and protecting sensitive data in cloud-native environments.

Syllabus

Securing Requests with Keycloak and Istio through Request-Level Authentication


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Advanced Operating Systems
Georgia Institute of Technology via Udacity
High Performance Computing
Georgia Institute of Technology via Udacity
GT - Refresher - Advanced OS
Georgia Institute of Technology via Udacity
Distributed Machine Learning with Apache Spark
University of California, Berkeley via edX
CS125x: Advanced Distributed Machine Learning with Apache Spark
University of California, Berkeley via edX