Sharma et al., 2020 - Google Patents
Policies and RulesSharma et al., 2020
- Document ID
- 8814647069055961916
- Author
- Sharma R
- Singh A
- Sharma R
- Singh A
- Publication year
- Publication venue
- Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes
External Links
Snippet
Application security is challenge in a microservice architecture. Developers build business process microservices in various languages. All these applications must be secured with the proper authentication and authorization. Most enterprises have one way of doing …
- 238000000034 method 0 abstract description 10
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10706427B2 (en) | Authenticating and enforcing compliance of devices using external services | |
Naik et al. | Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect | |
US9800681B2 (en) | Network traffic monitoring system and method to redirect network traffic through a network intermediary | |
US10484357B1 (en) | Method and apparatus for federated single sign on using authentication broker | |
US8418234B2 (en) | Authentication of a principal in a federation | |
JP5021215B2 (en) | Reliable third-party authentication for web services | |
US8707026B2 (en) | Apparatus for certificate-based cookie security | |
JP7145308B2 (en) | A secure way to replicate on-premises secrets in your compute environment | |
Manzoor | Securing device connectivity in the industrial internet of things (IoT) | |
Keltoum et al. | A dynamic federated identity management approach for cloud-based environments | |
Beuchelt | Securing Web applications, services, and servers | |
Muthukrishnan et al. | Technical analysis on security realization in web services for e-business management | |
Sharma et al. | Policies and Rules | |
Calles et al. | Authentication and authorization | |
Rajathi et al. | Practical Implementation and Analysis of TLS Client Certificate Authentication | |
Hatala et al. | Federated security: Lightweight security infrastructure for object repositories and web services | |
Ferdous et al. | A hybrid model of attribute aggregation in federated identity management | |
Schwartz et al. | SAML | |
Reynders et al. | Securing APIs | |
Indrasiri et al. | Security in WSO2 ESB | |
JP2024536923A (en) | SYSTEM AND METHOD FOR DUAL ENDPOINT ACCESS CONTROL OF REMOTE CLOUD STORED RESOURCES - Patent application | |
Hatala et al. | Secure Communication Infrastructure for Object Repositories and Web Services | |
Arnedo-Moreno et al. | A security framework for JXTA-overlay | |
Moralis et al. | Security Standards and Issues for Grid Computing | |
Dočár | Bezpečnostní řešení pro cloudové technologie |