-
Notifications
You must be signed in to change notification settings - Fork 709
Closed
Labels
area/policyhelp wantedExtra attention is neededExtra attention is neededkind/enhancementNew feature or requestNew feature or request
Milestone
Description
Relates to
What is this?
EG can leverage RBAC for implementing fine-grained access control, at both the Gateway and xRoute level.
The principal, obtained through the authentication process (such as OIDC, JWT, etc.), serves as the basis for defining access control policies. Source IP-based access control can also be supported in this model.
The below is roughly how API will look like, but it's just an initial idea and definitely needs more input.
API outline
kind: SecurityPolicy
metadata:
name: rbac-example
spec:
targetRef:
group: gateway.networking.k8s.io
kind: HTTPRoute
name: http-route
jwt: # a jwt or oidc configuration is needed to obtain the principal
......
authorization:
- principals: ["john"]
permissions:
methods: ["GET", "POST"]
paths: ["/foo", "/bar"]
Reference:envoyproxy/envoy#7913
- Allow/Deny IP Subnets
- Authorization based on JWT claim
- Authorization based on Basic Auth Username Extract username from basic auth and forward it to backends #2947
- Authorization based on client cert
- Authorization based on identity extracted from an arbitrary HTTP header
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
area/policyhelp wantedExtra attention is neededExtra attention is neededkind/enhancementNew feature or requestNew feature or request