You are browsing documentation for an outdated version.
See the latest documentation here.
Kong Mesh builds on top of Kuma with the following Enterprise features:
mTLS policy backends
Kong Mesh supports the following additional backends for the
Open Policy Agent (OPA) support
You can use OPA with Kong Mesh
to provide access control for your services.
The agent is included in the data plane proxy sidecar.
To add to the security of your deployments, Kong Mesh provides
authentication of zone control planes
to the global control plane.
Authentication is based on the Zone Token, which is also used to authenticate the zone proxy.
FIPS 140-2 support
Kong Mesh provides built-in support for the Federal Information Processing Standard (FIPS-2).
See FIPS Support for more information.
Certificate Authority rotation
Kong Mesh lets you provide secure communication between applications with mTLS.
You can change the mTLS backend with Certificate Authority rotation,
to support a scenario such as migrating from the builtin CA to a Vault CA.
Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC) in Kong Mesh
lets you restrict access to resources and actions to specified users or groups based on user roles.
Apply targeted security policies, implement granular traffic control, and much more.
Red Hat Universal Base Images
Kong Mesh provides images based on the Red Hat Universal Base Image (UBI).
Kong Mesh UBI images are distributed with all standard images, but with the
See the UBI documentation for more information.