Service-to-Service Without Shared Secrets
API calls secured with certificates, not API keys. Every service gets a unique identity with automatic rotation. Services authenticate with short-lived certificates instead of API keys. No API keys stored in env files for service auth.
Compatible Platforms (via mTLS / X.509)
Works with service meshes that support mTLS (e.g., Istio, Linkerd, Consul, Envoy).
Istio
Linkerd
Consul
Envoy Proxy
mTLS & Protocol Support
mTLS with short-lived X.509 certs; SPIFFE-style IDs supported. Compatible with OAuth 2.0
mTLS client authentication(when supported by your gateway/IdP)
Short-lived certificates (e.g., hours) with automated renewal via API or
cert-managerReload behavior depends on your mesh/proxy
No API keys required for service authReduces reliance on external
secret stores, though other secrets may still be managed there