Security and Enforcing policies
One of the key tenants of a Service Mesh is the ability to encrypt and control service to service communication. With Kong Mesh, your application developers can concentrate on core business logic, whilst Mesh deals with security.Service to Service encryption (mTLS)
Learn how to configure service to service encryption, generate certificates, configure external Certificate Authorities
Common enforcment policies
Guide to deploying Kong Mesh in Universal mode using Docker containers. Walks through installing the Control Plane, adding demo services, enabling mTLS, and configuring gateways.
Role based access
Configure what rights and access your developers and platform teams have whilst using Kong Mesh