tag-v1.21.6
About the documentation
Introduction
What is Envoy
Architecture overview
Introduction
Listeners
HTTP
Upstream clusters
Observability
Security
TLS
JSON Web Token (JWT) Authentication
External Authorization
Role Based Access Control
Threat model
External dependencies
Google Vulnerability Reward Program (VRP)
Operations & configuration
Other features
Other protocols
Advanced
Life of a Request
Deployment types
Getting help
Getting Started
Configuration reference
Operations and administration
Extending Envoy for custom use cases
API
FAQ
Version history
envoy
»
Introduction
»
Architecture overview
»
Security
View page source
Security
ΒΆ
TLS
Underlying implementation
FIPS 140-2
Enabling certificate verification
Certificate selection
Secret discovery service (SDS)
OCSP Stapling
Authentication filter
Custom handshaker extension
Trouble shooting
JSON Web Token (JWT) Authentication
External Authorization
Service Definition
Role Based Access Control
Policy
Shadow Policy
Condition
Threat model
Confidentiality, integrity and availability
Data and control plane
Core and extensions
External dependencies
Data plane (core)
Data plane (extensions)
Control plane
API
Observability (core)
Observability (extensions)
Build
Miscellaneous
Test only
Google Vulnerability Reward Program (VRP)
Rules
Threat model
Execution environment
Objectives
Working with the Docker images
Rebuilding the Docker image