Skip to content
A cloud native Identity & Access Proxy / API (IAP) and Access Control Decision API that authenticates, authorizes, and mutates incoming HTTP(s) requests. Inspired by the BeyondCorp / Zero Trust white paper. Written in Go.
Go Shell Other
Branch: master
Clone or download
kubadz and aeneasr pipeline/authn: Add token_from config to introspection and jwt (#271)
Add additional optional configuration to jwt and oauth2_introspection authenticators allowing to set from where (which header or query parameter) the token should be received. The configuration is a token_from field in per-rule-configuration, as described in a linked issue.

Closes #257
Latest commit fc85ac8 Oct 9, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.circleci Validate configuration with JSON Schema Jul 17, 2019
.github mutator/id_token: Add claim templating (#246) Aug 22, 2019
.schemas pipeline/authn: Add token_from config to introspection and jwt (#271) Oct 9, 2019
api Resolve broken tests (#262) Sep 23, 2019
cmd rule: Add migration capabilities (#268) Sep 26, 2019
credentials Reduce deployment complexity and refactor internals (#185) May 17, 2019
docs Homogenize configuration management (#258) Sep 23, 2019
driver Resolve broken tests (#262) Sep 23, 2019
helper pipeline/authn: Add token_from config to introspection and jwt (#271) Oct 9, 2019
internal Homogenize configuration management (#258) Sep 23, 2019
pipeline pipeline/authn: Add token_from config to introspection and jwt (#271) Oct 9, 2019
proxy Homogenize configuration management (#258) Sep 23, 2019
rule rule: Add migration capabilities (#268) Sep 26, 2019
scripts Validate configuration with JSON Schema Jul 17, 2019
sdk mutator/id_token: Add claim templating (#246) Aug 22, 2019
test authz: Change error code from 403 to 401 (#259) Sep 23, 2019
x rule: Add migration capabilities (#268) Sep 26, 2019
.dockerignore server: Properly declare negroni middleware (#200) May 28, 2019
.gitattributes Tells linguist to ignore SDK files May 10, 2018
.gitignore Validate configuration with JSON Schema Jul 17, 2019
.golangci.yml ci: Adopt new release pipeline (#171) Apr 8, 2019
.goreleaser.yml rule: Add migration capabilities (#268) Sep 26, 2019
CHANGELOG.md Resolve broken tests (#262) Sep 23, 2019
CODE_OF_CONDUCT.md Reduce deployment complexity and refactor internals (#185) May 17, 2019
CONTRIBUTING.md mutator/id_token: Add claim templating (#246) Aug 22, 2019
Dockerfile Move back to scratch Docker image Aug 2, 2019
LICENSE docs: Updates copyright notice Jun 16, 2018
Makefile rule: Add migration capabilities (#268) Sep 26, 2019
README.md Resolve broken tests (#262) Sep 23, 2019
SECURITY.md mutator/id_token: Add claim templating (#246) Aug 22, 2019
UPGRADE.md rule: Add migration capabilities (#268) Sep 26, 2019
doc.go all: Updates license header Feb 27, 2018
doc_swagger.go all: Updates license header Feb 27, 2018
docker-compose.yml docs: Update documentation links (#144) Dec 8, 2018
go.mod pipeline/authn: Add token_from config to introspection and jwt (#271) Oct 9, 2019
go.sum rule: Add migration capabilities (#268) Sep 26, 2019
install.sh Resolve issue with install.sh script (#187) May 14, 2019
main.go all: Updates license header Feb 27, 2018
package.json Reduce deployment complexity and refactor internals (#185) May 17, 2019

README.md

ORY Oathkeeper - Cloud Native Identity & Access Proxy

Chat | Forums | Newsletter

Guide | API Docs | Code Docs

Support this project!

ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. The BeyondCorp Model is designed by Google and secures applications in Zero-Trust networks.

An Identity & Access Proxy is typically deployed in front of (think API Gateway) web-facing applications and is capable of authenticating and optionally authorizing access requests. The Access Control Decision API can be deployed alongside an existing API Gateway or reverse proxy. ORY Oathkeeper's Access Control Decision API works with:

among others.

This service is stable, but under active development and may introduce breaking changes in future releases. Any breaking change will have extensive documentation and upgrade instructions.

CircleCI

Go Report Card


Installation

Head over to the to build ORY Oathkeeper from source.

Who's using it?

The ORY community stands on the shoulders of individuals, companies, and maintainers. We thank everyone involved - from submitting bug reports and feature requests, to contributing patches, to sponsoring our work. Our community is 1000+ strong and growing rapidly. The ORY stack protects 1.200.000.000+ API requests every month with over 15.000+ active service nodes. Our small but expert team would have never been able to achieve this without each and everyone of you.

The following list represents companies that have accompanied us along the way and that have made outstanding contributions to our ecosystem. If you think that your company deserves a spot here, reach out to hi@ory.shnow!

Please consider giving back by becoming a sponsor of our open source work on Patreon or Open Collective.

Type Name Logo Website
Sponsor Raspberry PI Foundation Raspberry PI Foundation raspberrypi.org
Contributor Kyma Project Kyma Project kyma-project.io
Sponsor ThoughtWorks ThoughtWorks thoughtworks.com
Sponsor Tulip Tulip Retail tulip.com
Sponsor Cashdeck / All My Funds All My Funds cashdeck.com.au
Sponsor 3 Rein 3REIN 3rein.com (avaiable soon)
Contributor Hootsuite Hootsuite hootsuite.com
Adopter * Segment Segment segment.com
Adopter * Arduino Arduino arduino.cc

We also want to thank all individual contributors

as well as all of our backers

and past & current supporters (in alphabetical order) on TheCrealm.

* Uses one of ORY's : Alexander Alimovs, Billy, Chancy Kennedy, Drozzy, Edwin Trejos, Howard Edidin, Ken Adler Oz Haven, Stefan Hans, TheCrealm.

* Uses one of ORY's major projects in production.

Ecosystem

ORY Security Console

ORY Security Console: Administrative User Interface

The # ORY Hydra: OAuth2 & OpenID Connect Server

is a visual admin interface for managing ORY Hydra, ORY Oathkeeper, and ORY Keto.

ORY Hydra: OAuth2 & OpenID Connect Server

resource consumption. ORY Hydra is not an ORY Hydra is a hardened OAuth2 and OpenID Connect server optimized for low-latency, high throughput, and low resource consumption. ORY Hydra is not an identity provider (user sign up, user log in, password reset flow), but connects to your existing identity provider through a consent app.

ORY Keto: Access Control Policies as a Server

determine whether a subject (user, appl is a policy decision point. It uses a set of access control policies, similar to AWS IAM Policies, in order to determine whether a subject (user, application, service, car, ...) is authorized to perform a certain action on a resource.

Examples

The ices from the ORY Ecosystem.

Security

repository contains numerous examples of setting up this project individually and together with other services from the ORY Ecosystem.

Security

Disclosing vulnerabilities

If you think you found a security vulnerability, please refrain from posting it publicly on the forums, the chat, or GitHub and send us an email to

Telemetry

Our services instead.

Telemetry

Our services collect summarized, anonymized data which can optionally be turned off. Click ntation

Guide

The Guide is available [here](h to learn more.

Documentation

Guide

The Guide is available ### HTTP API documentation

The HTTP API is documented .

HTTP API documentation

The HTTP API is documented

Upgrading and Changelog

New releases might introduce b.

Upgrading and Changelog

New releases might introduce breaking changes. To help you identify and incorporate those changes, we document these changes in

Command line documenta and

Run oathkeeper -h or `oat.

Command line documentation

Run oathkeeper -h or oathkeeper help.

Develop

Developing with ORY Oathkeeper is as easy as:

$ export GO111MODULE=on
$ go test ./...


##

Backers

Thank you to all our backers! 🙏 [a

href="ref="https://opencollective.com/ory#ba" target="]

We would also like to thank (past & current) supporters (in alphabetical order) on Crealm

Sponsors

Support this p: Alexander Alimovs, Billy, Chancy Kennedy, Drozzy, Edwin Trejos, Howard Edidin, Ken Adler Oz Haven, Stefan Hans, TheCrealm

Sponsors

Support this project by becoming a sponsor. Your logo will show up here with a link to your website. [a href="ctive.com/ory/sponsor/0/website" target="_blank""

]

A special thanks goes out to Wayne Robinson for supporting this ecosystem with $200 every month since Oktober 201


You can’t perform that action at this time.