Security and enforcing policies
One of the key tenets of a Service Mesh is the ability to encrypt and control service to service communication. With Kong Mesh, your application developers can concentrate on core business logic, while Mesh deals with security.
Service to Service encryption (mTLS)
Learn how to configure service to service encryption, generate certificates, and configure external Certificate Authorities.
Common enforcment policies
Guide to deploying Kong Mesh in Universal mode using Docker containers. Walks through installing the Control Plane, adding demo services, enabling mTLS, and configuring gateways.
Role based access
Configure what rights and access your developers and platform teams have whilst using Kong Mesh