-
Notifications
You must be signed in to change notification settings - Fork 687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multiple named AuthServices #216
Comments
This would be a great addition, that way we won't have to add the path configuration for authentication to the auth service. |
This is what I was expecting Ambassador to have after experiencing the "self service" style configuration for routing. How auth currently works goes totally against the self service ideology IMO. Right now, all teams/individuals hav to ship changes to two independent services (their service + auth service) whenever they need to change how their service is protected. Also, multiple teams will end up contributing to the same auth service and the auth service might end up being much more complex than it would make sense as business logic might creep in to the auth service handlers. |
For people who have clusters whose services have different authentication requirements and prefer a self-service approach: What alternatives did you find? Is using authentication in Istio a valid alternative? Or maybe not using Ambassador at all? In this case. when we talk about authentication what tool do you think is a good reference for future versions of Ambassador to look upon? |
any update on this issue? this is a roadblock to our integration of ambassador |
I completely agree that this sort of thing would be a good addition and agree with @owais that it's much more kube-native than having one monolithic auth service that has to handle all requests. An alternative example:
|
#174 is related. |
Not sure it helps but I've been working on a highly dynamic external auth service. It supports several authentication plugins including ldap, jwt, htpasswd, oauth/openid, etc and allows you to put them in a 'pipeline' so you could string several plugins together and if 1 of them passes then the request is allowed (toying with the idea of forcing all of them to pass as well). I for example secure the same service with openid (for sso type stuff) and basic auth backed by ldap to support machine-to-machine style communication. A single deployment of the service can house https://github.com/travisghansen/external-auth-server |
We support this in Ambassador Pro now, via the |
removed getting started content, as it is being replaced by docs [apro #830]
Awesome service, @travisghansen. Thanks for your contribution!
Is something like this officially supported with the OSS offering (Emissary), or are we restricted to one |
I’m putting the final touches on envoy grpc support within the project as well if that’s helpful to anyone :) |
Support multiple named AuthServices and enable them on a per route mapping configuration.
Would also unlock related issue: #174
For example, configuring multiple AuthServices:
And configuring routes:
Therefore, not all request methods will be proxied to an auth service, and we can select which auth service to use for dynamic routes.
The text was updated successfully, but these errors were encountered: