Authentication Strategies
Choosing and configuring the appropriate authentication strategy.
Choosing and configuring the appropriate authentication strategy.
Configuring additional, non-default dashboards.
Configuring Kiali’s Jaeger integration.
Configuring the namespaces accessible and visible to Kiali.
Configuring RBAC based on the authentication strategy.
Customizing Health for Request Traffic.
Ensuring Kiali can visualize a VM WorkloadEntry.