Skip to content

Commit

Permalink
more docu
Browse files Browse the repository at this point in the history
  • Loading branch information
dadrus committed Feb 4, 2022
1 parent 8e26261 commit 6e91ee0
Show file tree
Hide file tree
Showing 3 changed files with 23 additions and 13 deletions.
20 changes: 12 additions & 8 deletions docs/docs/guides/traefik-proxy-integration.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,20 @@ id: traefik-proxy-integration
title: Traefik Proxy Integration
---

[Traefik Proxy](https://doc.traefik.io/traefik/) is modern HTTP proxy and load balancer for microservices, oathkeeper can be integrated with via the [ForwardAuth Middleware](https://doc.traefik.io/traefik/middlewares/http/forwardauth/) by making use of the available [Access Control Decision API](index.md#access-control-decision-api).
[Traefik Proxy](https://doc.traefik.io/traefik/) is modern HTTP proxy and load
balancer for microservices, oathkeeper can be integrated with via the
[ForwardAuth Middleware](https://doc.traefik.io/traefik/middlewares/http/forwardauth/)
by making use of the available
[Access Control Decision API](index.md#access-control-decision-api).

To achieve this,
* configure traefik
* to make use of the aforesaid ForwardAuth middleware by setting the `address` property to the decision URL endpoint and
* by including the required header name(s), the oathkeeper sets in the HTTP responses into the `authResponseHeaders` property.
* configure the route of your service to make use of this middleware

- configure traefik
- to make use of the aforesaid ForwardAuth middleware by setting the `address`
property to the decision URL endpoint and
- by including the required header name(s), the oathkeeper sets in the HTTP
responses into the `authResponseHeaders` property.
- configure the route of your service to make use of this middleware

Example (using Docker labels):

Expand All @@ -29,6 +36,3 @@ service:
- traefik.http.routers.service.middlewares=oathkeeper
# further labels
```



11 changes: 7 additions & 4 deletions docs/docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -188,10 +188,13 @@ X-User-ID: john.doe
The decision engine allows to configure how ORY Oathkeeper authorizes HTTP
requests. Authorization happens in four steps, each of which can be configured:

1. **Access Rule Matching:** Verifies that the HTTP method, path, and host of
the incoming HTTP request conform to your access rules. The request is denied
if no access rules match. The configuration of the matching access rule
becomes the input for the next steps.
1. **Access Rule Matching:** Verifies that the HTTP method, path, scheme, and
host of the incoming HTTP request conform to your access rules. The
information is taken either from the URL, or from the `X-Forwarded-Method`,
`X-Forwarded-Proto`, `X-Forwarded-Host`, `X-Forwarded-Uri` headers (if
present) of the incoming request. The request is denied if no access rules
match. The configuration of the matching access rule becomes the input for
the next steps.
2. **Authentication:** Oathkeeper can validate credentials via a variety of
methods like Bearer Token, Basic Authorization, or cookie. Invalid
credentials result in denial of the request. The "internal" session state
Expand Down
5 changes: 4 additions & 1 deletion docs/docs/pipeline/error.md
Original file line number Diff line number Diff line change
Expand Up @@ -415,7 +415,10 @@ conditions under the `when` key.

If you want to append the current url (where the error happened) to address
redirected to, You can specify `return_to_query_param` to set the name of
parameter that will hold the url.
parameter that will hold the url. The information about the current url is taken
either from the URL, or from the `X-Forwarded-Method`, `X-Forwarded-Proto`,
`X-Forwarded-Host`, `X-Forwarded-Uri` headers (if present) of the incoming
request.

**Example**

Expand Down

0 comments on commit 6e91ee0

Please sign in to comment.