Skip to content
Kong Logo | Kong Docs Logo
search
  • We're Hiring!
  • Docs
    • Kong Gateway
    • Kong Konnect
    • Kong Mesh
    • Plugin Hub
    • decK
    • Kubernetes Ingress Controller
    • Insomnia
    • Kuma

    • Docs contribution guidelines
  • Plugin Hub
  • Support
  • Community
  • Kong Academy
Get a Demo Start Free Trial
  • Kong Gateway
  • Kong Konnect
  • Kong Mesh
  • Plugin Hub
  • decK
  • Kubernetes Ingress Controller
  • Insomnia
  • Kuma

  • Docs contribution guidelines
  • 2.2.x (latest)
  • 2.1.x
  • 2.0.x
  • 1.9.x
  • 1.8.x
  • 1.7.x
  • 1.6.x
  • 1.5.x
  • 1.4.x
  • 1.3.x
  • 1.2.x

github-edit-pageEdit this page

report-issueReport an issue

enterprise-switcher-iconSwitch to OSS

On this pageOn this page
  • mTLS policy backends
  • Open Policy Agent (OPA) support
  • Multi-zone authentication
  • FIPS 140-2 support
  • Certificate Authority rotation
  • Role-Based Access Control (RBAC)
  • Red Hat Universal Base Images
  • Windows Support
Kong Mesh
2.1.x
  • Home
  • Kong Mesh
  • Features
  • Enterprise Features
You are browsing documentation for an outdated version. See the latest documentation here.

Enterprise Features

Kong Mesh builds on top of Kuma with the following Enterprise features:

mTLS policy backends

Kong Mesh supports the following additional backends for the mTLS policy:

  • HashiCorp Vault CA
  • Amazon Certificate Manager Private CA
  • Kubernetes cert-manager CA

Open Policy Agent (OPA) support

You can use OPA with Kong Mesh to provide access control for your services.

The agent is included in the data plane proxy sidecar.

Multi-zone authentication

To add to the security of your deployments, Kong Mesh provides authentication of zone control planes to the global control plane.

Authentication is based on the Zone Token, which is also used to authenticate the zone proxy.

FIPS 140-2 support

Kong Mesh provides built-in support for the Federal Information Processing Standard (FIPS-2). See FIPS Support for more information.

Certificate Authority rotation

Kong Mesh lets you provide secure communication between applications with mTLS. You can change the mTLS backend with Certificate Authority rotation, to support a scenario such as migrating from the builtin CA to a Vault CA.

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) in Kong Mesh lets you restrict access to resources and actions to specified users or groups based on user roles. Apply targeted security policies, implement granular traffic control, and much more.

Red Hat Universal Base Images

Kong Mesh provides images based on the Red Hat Universal Base Image (UBI).

Kong Mesh UBI images are distributed with all standard images, but with the ubi- prefix. See the UBI documentation for more information.

Windows Support

You can install Kong Mesh on Windows.

Thank you for your feedback.
Was this page useful?
  • Kong
    THE CLOUD CONNECTIVITY COMPANY

    Kong powers reliable digital connections across APIs, hybrid and multi-cloud environments.

    • Company
    • Customers
    • Events
    • Investors
    • Careers Hiring!
    • Partners
    • Press
    • Contact
  • Products
    • Kong Konnect
    • Kong Gateway
    • Kong Mesh
    • Get Started
    • Pricing
  • Resources
    • eBooks
    • Webinars
    • Briefs
    • Blog
    • API Gateway
    • Microservices
  • Open Source
    • Install Kong Gateway
    • Kong Community
    • Kubernetes Ingress
    • Kuma
    • Insomnia
  • Solutions
    • Decentralize
    • Secure & Govern
    • Create a Dev Platform
    • API Gateway
    • Kubernetes
    • Service Mesh
Star
  • Terms•Privacy
© Kong Inc. 2023