SecuritySecurity Threat model Confidentiality, integrity and availabilityData and control planeCore and extensions TLS Underlying implementationFIPS 140-2Enabling certificate verificationCertificate selectionSecret discovery service (SDS)Authentication filterTrouble shooting JSON Web Token (JWT) AuthenticationExternal Authorization Service Definition Role Based Access Control PolicyShadow PolicyCondition