Slide 18
Slide 18 text
© Okta and/or its affiliates. All rights reserved.
if you can model it you can enforce it
Unlimited possibilities
● Secure access:
■ user to API (endpoint, method, host, etc)
■ user to user
■ user to resource
■ service to service, namespace to namespace, namespace to cluster, tier to tier,
environment to environment, cluster to cluster, cloud to cloud, etc
● Easy integration: SDK, Ingress gateway, sidecar, etc.
● Auditability and forensic analysis by inspecting audit logs and access decisions
● Observability and controllability by processing logs and taking actions.
@jcchavezs