You know that moment when your access stack feels like a maze built by five different teams with six different standards? That’s the problem Kuma Mercurial was designed to clean up. It merges service connectivity from Kuma’s service mesh with fast, controlled access tracking that moves as quickly as your deployment pipeline.
Kuma handles secure network traffic and observability across microservices. Mercurial focuses on lightweight automation for versioning and integration logic. Together they create a clean workflow where service policies, identity data, and configuration states travel safely across your stack. Instead of juggling YAML templates and half-baked permission scripts, you get a coherent system that enforces both identity and routing rules.
At the heart of a solid Kuma Mercurial workflow is trust. Your mesh defines how services talk. Mercurial translates those service-level decisions into repeatable automation that teams can extend, audit, or roll back with a single change. It uses existing standards like OIDC or SAML to hook identity directly into network-level policy. You decide who can deploy, which pods can reach which APIs, and what traffic deserves encryption — all verified automatically.
How do you connect Kuma and Mercurial?
Start with clear identity boundaries. Point Kuma at your authentication provider such as Okta or AWS IAM, then let Mercurial manage the configuration states that flow through those authenticated endpoints. When a developer requests access, their token drives a policy update through Mercurial that Kuma instantly applies. No manual firewall edits. No waiting for approval tickets.
Quick answer for fast setup
To integrate Kuma Mercurial, sync your identity provider through standard APIs, map roles to service routes, and let Mercurial version those rules. The mesh enforces them live, creating continuous, policy-driven connectivity without reconfiguring infrastructure.