Главная
Study mode:
on
1
Intro
2
Session Overview (1/3)
3
Underlying technology 1.JWT validation
4
Underlying technology 2' - OAuth MTLS (RFC 8705)
5
What is Keycloak?
6
Security boundary transition scenario
7
Change API Gateway to NGINX Ingress Controller
8
Shift security boundary to per service
9
Shift security boundary to per pod
10
How to achieve JWT validation (east-west traffic)
11
Where is the chokepoint?
12
Option A: Cache token introspection responses
13
Summary
Description:
Explore a lightweight approach to implementing and transitioning to a zero-trust network using Keycloak and NGINX in this 27-minute conference talk presented by Yoshiyuki Tabata from Hitachi, Ltd. at a Linux Foundation event. Delve into underlying technologies such as JWT validation and OAuth MTLS (RFC 8705), and gain insights into Keycloak's role in the process. Learn about security boundary transition scenarios, including changing API Gateway to NGINX Ingress Controller and shifting security boundaries to per-service and per-pod levels. Discover techniques for achieving JWT validation for east-west traffic and examine potential chokepoints in the system. The talk concludes with a discussion on caching token introspection responses as a possible solution.

Lightweight Zero-Trust Network Implementation and Transition with Keycloak and NGINX

Linux Foundation
Add to list
0:00 / 0:00