Add support for OpenID Connect (OIDC) #2635
zhaohuabing
started this conversation in
Ideas
Replies: 1 comment
-
This is how OIDC is supported with apiVersion: gateway.envoyproxy.io/v1alpha1
kind: SecurityPolicy
metadata:
name: oidc-example
spec:
targetRef:
group: gateway.networking.k8s.io
kind: HTTPRoute # can target at Gateway or HTTPRoute
name: backend
oidc:
provider:
issuer: "https://accounts.google.com"
clientID: "${CLIENT_ID}.apps.googleusercontent.com"
clientSecret:
name: "my-app-client-secret" |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
What would you like to be added:
The ability to configure OpenID Connect (OIDC) authentication on a Gateway or an HTTPRoute.
Why this is needed:
OpenID Connect (OIDC) authentication is an authentication standard built on top of OAuth 2.0.
It enables client applications to rely on authentication that is performed by an OpenID Connect Provider (OP)
to verify the identity of a user. It's widely used in web applications and supported by Gateway implementations.
Existing Implementations:
Some existing data planes that support OIDC Authentication
Some existing control planes that support Basic Authentication
This could be part of a fat
SecurityPolicy
, or a standalone OIDC policy, as mentioned in this comment: #2626 (reply in thread).Relates to:
Beta Was this translation helpful? Give feedback.
All reactions