Skip to content

Commit 90d0b87

Browse files
committed
Review
1 parent 3ec788c commit 90d0b87

File tree

2 files changed

+15
-11
lines changed

2 files changed

+15
-11
lines changed

03-authentication/policy-jwt-example.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,6 @@ spec:
2222
- name: httpbin
2323
origins:
2424
- jwt:
25-
issuer: http://demo-keycloak-http.keycloak/auth/realms/testrealm
26-
jwksUri: http://demo-keycloak-http.keycloak/auth/realms/testrealm/protocol/openid-connect/certs
25+
issuer: http://demo-keycloak-http.keycloak/auth/realms/demo
26+
jwksUri: http://demo-keycloak-http.keycloak/auth/realms/demo/protocol/openid-connect/certs
2727
principalBinding: USE_ORIGIN

README.md

+13-9
Original file line numberDiff line numberDiff line change
@@ -55,12 +55,16 @@ Check that the service responds through Istio
5555

5656
```
5757
$ istiocurl http://x/headers -w '\n'
58-
{ ... }
58+
{
59+
"headers": {
60+
...
61+
"X-Envoy-Decorator-Operation": "httpbin.foo.svc.cluster.local:8000/*",
62+
...
5963
```
6064

6165
## Require authentication
6266

63-
Apply the [gateway and virtualservice](https://istio.io/docs/tasks/security/authn-policy/#end-user-authentication).
67+
We already [exposed](https://istio.io/docs/tasks/security/authn-policy/#end-user-authentication) httpbin to the public, so let's hurry up with:
6468

6569
```
6670
kubectl apply -f ./03-authentication
@@ -91,19 +95,18 @@ helm install --namespace keycloak --name demo stable/keycloak \
9195
Use `kubectl -n keycloak get service demo-keycloak-http` to verify existence of the service that the authentication step (above) depends on.
9296

9397
Use appropriate means of accessing the UI in a browser, for example the NodePort enabled by the helm options above (`minikube service -n keycloak demo-keycloak-http`).
94-
The Keycloak UI somtimes behaves erratically over `kubectl port-forward`.
98+
The Keycloak UI tends to malfunction over `kubectl port-forward`.
9599

96100
You should see a login page where the username and password generated above works.
97101

98102
## Set up a login
99103

100104
* [Create a realm](https://www.keycloak.org/docs/latest/getting_started/index.html#creating-a-realm-and-user) named `demo`.
101105
* Under the `Login` tab `Require SSL` select `none` to allow plain http.
102-
* Under ? disable password change on first login.
103106
* Create two [users](https://www.keycloak.org/docs/latest/getting_started/index.html#_create-new-user) `test1` and `test2` and use the `Credentials` tab to set their passwords to `test` with `Temporary` set to `OFF`.
104107
* Create an [OpenID Connect](https://www.keycloak.org/docs/latest/server_admin/index.html#oidc-clients) "client" named `myapp` in your demo realm.
105108
- Any "Root URL" is fine for this example
106-
* In the client make sure "Acces Type" is `public`. We want to make sure this demo setup is as insecure as possible 🙂.
109+
* In the client make sure "Acces Type" is `public`. We want this demo setup is as insecure as possible 🙂.
107110

108111
## Authenticate
109112

@@ -124,15 +127,15 @@ You can use an online service like [jsonwebtoken.io](https://www.jsonwebtoken.io
124127
Tokens expire after a while so you may want these two lines, together with the alias created during preparations.
125128

126129
```
127-
$ token=$(<the curl + jq above>)
128-
$ istiocurl http://x/headers -w '\n' -H "Authorization: Bearer $token"
130+
$ TOKEN=$(<the curl + jq above>)
131+
$ istiocurl http://x/headers -w '\n' -H "Authorization: Bearer $TOKEN"
129132
{ ... }
130133
```
131134

132135
Now, does authentication only apply when going through Istio's gateway?
133136

134137
```
135-
kubectl run --restart=Never -t -i --rm --image=gcr.io/cloud-builders/curl testcurl -- http://httpbin.foo:8000/ -w '\n' -H "Authorization: Bearer $token"
138+
kubectl run --restart=Never -t -i --rm --image=gcr.io/cloud-builders/curl testcurl -- http://httpbin.foo:8000/ -w '\n' -H "Authorization: Bearer $TOKEN"
136139
```
137140

138141
Indeed not.
@@ -147,7 +150,8 @@ kubectl apply -f ./08-authorization
147150
kubectl -n foo edit servicerolebinding jwt-binding
148151
```
149152

150-
At this stage the Troubleshooting Authorization guide in Istio docs is a recommended read.
153+
At this stage the [Debugging Authorization](https://istio.io/help/ops/security/debugging-authorization/) section in Istio docs is a recommended read,
154+
in particular [how to access logs](https://istio.io/help/ops/security/debugging-authorization/#ensure-proxies-enforce-policies-correctly).
151155

152156
## Summary
153157

0 commit comments

Comments
 (0)