Skip to content

istio-ecosystem/authservice

master
Switch branches/tags
Code

Latest commit

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
run
 
 
src
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

authservice Actions Status

An implementation of Envoy External Authorization, focused on delivering authN/Z solutions for Istio and Kubernetes.

Introduction

authservice helps delegate the OIDC Authorization Code Grant Flow to the Istio mesh. authservice is compatible with any standard OIDC Provider as well as other Istio End-user Auth features, including Authentication Policy and RBAC. Together, they allow developers to protect their APIs and web apps without any application code required.

Some of the features it provides:

  • Transparent login and logout
    • Retrieves OAuth2 Access tokens, ID tokens, and refresh tokens
  • Fine-grained control over which url paths are protected
  • Session management
    • Configuration of session lifetime and idle timeouts
    • Refreshes expired tokens automatically
  • Compatible with any standard OIDC Provider
  • Supports multiple OIDC Providers for same application
  • Trusts custom CA certs when talking to OIDC Providers
  • Works either at the sidecar or gateway level

Using the authservice docker image

The authservice images are hosted on authservice's GitHub Package Registry.

Usage

Please refer to the bookinfo-example directory for an example of how to use the Authservice.

Refer to the configuration options guide for all of the available configuration options.

How does authservice work?

We have created a flowchart to explain how authservice makes decisions at different points in the login lifecycle.

Contributing

To get started:

Roadmap

See the authservice github Project

Additional features being considered:

  • A more Istio-integrated experience of deploying/configuring/enabling authservice (e.g.: extending Istio Authentication Policy to include authservice configs).

Contributing & Contact

We welcome feedback and contributions. Aside from submitting Github issues/PRs, you can reach out at #oidc-proposal or #security channel on Istio’s Slack workspace (here's how to join).