Summary
In this chapter, we read about how Istio provides authentication and authorization. We also read about how to implement service-to-service authentication using mutual TLS within a Service Mesh using the PeerAuthentication
policy, as well as mutual TLS with clients external to a Service Mesh by using the mutual TLS mode at the Ingress gateway. We then read about end user authentication using the RequestAuthentication
policy. We configured Auth0 to gain some real-life experience in using authentication and identity providers.
To finish off, we then read about AuthorizationPolicy
and how it can be used to enforce various authorization checks to ensure that the authenticated identity is authorized to access the requested resources.
In the next chapter, we will read about how Istio helps in making microservices observable and how various observability tools and software can be integrated with Istio.