SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
Auth proxy pattern on
k8s
Michał Wcisło
27.07.2019
Agenda
2
▰ OAuth2 and OpenID connect basics
▰ Introduction to Auth proxy on k8s
▰ Simple binary authorization scenario
▰ The way forward...
A few words about myself
3
▰ 8 years in Nokia
▰ Worked in telco research (VoIP, MIMO), QA,
Technical Support and Development
▰ Currently working on development of Nokia
AVA ecosystem, specifically k8s as a service
OAuth2.0
OAuth2.0
5
▰ Open standard for access
delegation.
▰ OAuth1.0 2010, OAuth2 2012
▰ Should be used for
Authorization
▰ Decoupling
Decoupling - components
6
Resource
owner
(user)
Client
(app/service)
Authorization
Server
Resource server
(service providing
information)
Client
Agent
(browser)
OAuth2.0 flows
The story...
8
Resource
owner
(user)
Client
Authorization
Server
Resource
server
User Agent
(browser)
Secret
(password)
Secret
(password)
Auth code Access token
Authorization code flow
9
Resource owner (user)
Client Authorization Server
Resource server
User Agent (browser)
1. King wanted to buy shoes...
2. I heard you wanted to buy shoes from the merchants
3. Yes I did, pay them and … I'm the king!
4. King just bought shoes from you, get your money...
Auth code Access token
5. Great, I need access to your treasury and … I'm the merchant!
6. OK, take the access papers
7. I need the access to treasury, here are access papers
8. OK, here are your money
Implicit flow
10
Resource owner (user) Authorization Server
Resource server
Client (browser/js app)
1. King wanted to buy this...
2. I heard you wanted to buy this from the merchants
3. Yes I did, pay them and … I'm the king!
Auth code Access token
4. Take the access papers, to access treasury
5. I need the access to treasury, here are access papers
6. OK, here are your money
Client credential flow
11
Authorization Server Resource server
Client
1. Jewellery cleaning service, please let us in!
Access token
2. Take the access papers, to access treasury
3. I need the access to treasury, to clean the jewellery, I have the papers
4. OK, take it
OpenID connect
OpenID connect
13
▰ Build on top of OAuth2
▰ Released in 2014, as a
standarization of different ways
for using OAuth2 for AuthN
▰ Should be used for
Authentication
OpenID connect vs OAuth2
14
▰ User info becomes resource
▰ Authorization code, implicit and
hybrid flows
▰ Additional parts for security –
i.e. nonce
▰ Scopes and claims – openid
scope
▰ ID token introduced
Client = relying party aka "who
is scared the most"?
Auth proxy
Authorization code flow
16
User Client
Authorization Server
User Agent (browser)
1. King wants to access VIP promotion
2. I heard you want to checkout VIP promotion, are you really king?
3. Yes, I'm the king!
4. Hey, King wants something from you
Auth code ID token
5. You mean THE KING? I'm only merchant!
6. Yes, this is his ID
7. I will redirect him to our premium shops and tell he is the king
Apps behind proxy
Running it on k8s + DEMO
17
Auth proxy beyond
basics
Other Auth proxy
implementations
19
▰ Keycloak-gatekeeper
▰ Pomerium – zero-trust
▰ Buzzfeed/sso - double Auth
proxy
K8s API access
20
▰ Configure k8s API access with
OpenID connect and Auth proxy
--oidc-issuer-url
--oidc-client-id
(--oidc-username-claim, --oidc-groups-claim)
▰ Impersonation
proxy: https://kccnceu19.sche
d.com/event/MPdT
▰ Configure kubectl to act as Auth
proxy
kubectl config set-credentials USER_NAME 
--auth-provider=oidc 
--auth-provider-arg=idp-issuer-url=( issuer url ) 
--auth-provider-arg=client-id=( your client id ) 
--auth-provider-arg=client-secret=( your client secret )

--auth-provider-arg=refresh-token=( your refresh token
) 
--auth-provider-arg=idp-certificate-authority=( path to
your ca certificate ) 
--auth-provider-arg=id-token=( your id_token )
Istio – access managment +
DEMO
21
▰ Guards talk to each other in secret
language (mTLS)
▰ Guards allow to talk to protected
resource only when ordered
(policy)
▰ Guards needs assistance to
recognize (authenticate) people
from outside world > Auth proxy
Summary
22
▰ OAuth2 and OpenID connect are modern
standards for AuthZ and AuthN
▰ Auth proxy allows easily incorporating them with
your applications
▰ K8s ingress controller can be used to
dynamically define Auth proxy redirects
▰ Istio with Auth proxy enables fine-grained
access managment
References
23
▰ OAuth 2.0 Threat Model and Security
Considerations
▰ Security Best Current Practice
▰ Impersonation proxy talk KubeCon
▰ All configuration files from this presentation are
published on https://github.com/m-
wcislo/talks
Thank you!
Credits
Special thanks to all the people who
made and released these awesome
resources for free:
▰ Presentation template by
SlidesCarnival
▰ Photographs by Unsplash
25

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 
Stateless authentication for microservices - Spring I/O 2015
Stateless authentication for microservices  - Spring I/O 2015Stateless authentication for microservices  - Spring I/O 2015
Stateless authentication for microservices - Spring I/O 2015
 
Implementing Open Banking with ForgeRock
Implementing Open Banking with ForgeRockImplementing Open Banking with ForgeRock
Implementing Open Banking with ForgeRock
 
The role of IAM in OpenBanking and where do we stand
The role of IAM in OpenBanking and where do we stand The role of IAM in OpenBanking and where do we stand
The role of IAM in OpenBanking and where do we stand
 
Mobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patternsMobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patterns
 
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
 
ForgeRock Open banking - Meetup 28/06/2018
ForgeRock Open banking - Meetup 28/06/2018ForgeRock Open banking - Meetup 28/06/2018
ForgeRock Open banking - Meetup 28/06/2018
 
Intelligent authentication Identity tech talks
Intelligent authentication Identity  tech talksIntelligent authentication Identity  tech talks
Intelligent authentication Identity tech talks
 
SingularityNET Developer Workshop
SingularityNET Developer Workshop SingularityNET Developer Workshop
SingularityNET Developer Workshop
 
Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015
 
OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...
OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...
OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...
 
Explaining Ethereum
Explaining EthereumExplaining Ethereum
Explaining Ethereum
 
Building a Blockchain in JavaScript - Nakov - at Beer.js - August 2018
Building a Blockchain in JavaScript - Nakov - at Beer.js - August 2018Building a Blockchain in JavaScript - Nakov - at Beer.js - August 2018
Building a Blockchain in JavaScript - Nakov - at Beer.js - August 2018
 
BLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPERBLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPER
 
Bitcoin cash standards
Bitcoin cash standardsBitcoin cash standards
Bitcoin cash standards
 
Write smart contract with solidity on Ethereum
Write smart contract with solidity on EthereumWrite smart contract with solidity on Ethereum
Write smart contract with solidity on Ethereum
 
Frictionless Adaption of PSD2 with WSO2
Frictionless Adaption of PSD2 with WSO2Frictionless Adaption of PSD2 with WSO2
Frictionless Adaption of PSD2 with WSO2
 
OAuth and why you should use it
OAuth and why you should use itOAuth and why you should use it
OAuth and why you should use it
 
Multi-Signature Crypto-Wallets: Nakov at SoftUnit Conf 2018
Multi-Signature Crypto-Wallets: Nakov at SoftUnit Conf 2018Multi-Signature Crypto-Wallets: Nakov at SoftUnit Conf 2018
Multi-Signature Crypto-Wallets: Nakov at SoftUnit Conf 2018
 
Gateway and secure micro services
Gateway and secure micro servicesGateway and secure micro services
Gateway and secure micro services
 

Similar a Auth proxy pattern on Kubernetes

Similar a Auth proxy pattern on Kubernetes (20)

CIS 2015 Extreme OAuth - Paul Meyer
CIS 2015 Extreme OAuth - Paul MeyerCIS 2015 Extreme OAuth - Paul Meyer
CIS 2015 Extreme OAuth - Paul Meyer
 
Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018
 
Accessing APIs using OAuth on the federated (WordPress) web
Accessing APIs using OAuth on the federated (WordPress) webAccessing APIs using OAuth on the federated (WordPress) web
Accessing APIs using OAuth on the federated (WordPress) web
 
[WSO2Con EU 2018] Identity APIs is the New Black
[WSO2Con EU 2018] Identity APIs is the New Black[WSO2Con EU 2018] Identity APIs is the New Black
[WSO2Con EU 2018] Identity APIs is the New Black
 
OAuth2 and OpenID with Spring Boot
OAuth2 and OpenID with Spring BootOAuth2 and OpenID with Spring Boot
OAuth2 and OpenID with Spring Boot
 
apidays Paris 2022 - Securing APIs in Open Banking, Takashi Norimatsu, Hitachi
apidays Paris 2022 - Securing APIs in Open Banking, Takashi Norimatsu, Hitachiapidays Paris 2022 - Securing APIs in Open Banking, Takashi Norimatsu, Hitachi
apidays Paris 2022 - Securing APIs in Open Banking, Takashi Norimatsu, Hitachi
 
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...
 
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
 
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
 
How we eased out security journey with OAuth (Goodbye Kerberos!) | Paul Makka...
How we eased out security journey with OAuth (Goodbye Kerberos!) | Paul Makka...How we eased out security journey with OAuth (Goodbye Kerberos!) | Paul Makka...
How we eased out security journey with OAuth (Goodbye Kerberos!) | Paul Makka...
 
2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...
2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...
2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...
 
SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
 SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
 
OAuth and OpenID Connect for PSD2 and Third-Party Access
OAuth and OpenID Connect for PSD2 and Third-Party AccessOAuth and OpenID Connect for PSD2 and Third-Party Access
OAuth and OpenID Connect for PSD2 and Third-Party Access
 
Authorization and Authentication using IdentityServer4
Authorization and Authentication using IdentityServer4Authorization and Authentication using IdentityServer4
Authorization and Authentication using IdentityServer4
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
KubeConRecap_nakamura.pdf
KubeConRecap_nakamura.pdfKubeConRecap_nakamura.pdf
KubeConRecap_nakamura.pdf
 
Stateless Auth using OAuth2 & JWT
Stateless Auth using OAuth2 & JWTStateless Auth using OAuth2 & JWT
Stateless Auth using OAuth2 & JWT
 

Último

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Último (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 

Auth proxy pattern on Kubernetes

  • 1. Auth proxy pattern on k8s Michał Wcisło 27.07.2019
  • 2. Agenda 2 ▰ OAuth2 and OpenID connect basics ▰ Introduction to Auth proxy on k8s ▰ Simple binary authorization scenario ▰ The way forward...
  • 3. A few words about myself 3 ▰ 8 years in Nokia ▰ Worked in telco research (VoIP, MIMO), QA, Technical Support and Development ▰ Currently working on development of Nokia AVA ecosystem, specifically k8s as a service
  • 5. OAuth2.0 5 ▰ Open standard for access delegation. ▰ OAuth1.0 2010, OAuth2 2012 ▰ Should be used for Authorization ▰ Decoupling
  • 9. Authorization code flow 9 Resource owner (user) Client Authorization Server Resource server User Agent (browser) 1. King wanted to buy shoes... 2. I heard you wanted to buy shoes from the merchants 3. Yes I did, pay them and … I'm the king! 4. King just bought shoes from you, get your money... Auth code Access token 5. Great, I need access to your treasury and … I'm the merchant! 6. OK, take the access papers 7. I need the access to treasury, here are access papers 8. OK, here are your money
  • 10. Implicit flow 10 Resource owner (user) Authorization Server Resource server Client (browser/js app) 1. King wanted to buy this... 2. I heard you wanted to buy this from the merchants 3. Yes I did, pay them and … I'm the king! Auth code Access token 4. Take the access papers, to access treasury 5. I need the access to treasury, here are access papers 6. OK, here are your money
  • 11. Client credential flow 11 Authorization Server Resource server Client 1. Jewellery cleaning service, please let us in! Access token 2. Take the access papers, to access treasury 3. I need the access to treasury, to clean the jewellery, I have the papers 4. OK, take it
  • 13. OpenID connect 13 ▰ Build on top of OAuth2 ▰ Released in 2014, as a standarization of different ways for using OAuth2 for AuthN ▰ Should be used for Authentication
  • 14. OpenID connect vs OAuth2 14 ▰ User info becomes resource ▰ Authorization code, implicit and hybrid flows ▰ Additional parts for security – i.e. nonce ▰ Scopes and claims – openid scope ▰ ID token introduced Client = relying party aka "who is scared the most"?
  • 16. Authorization code flow 16 User Client Authorization Server User Agent (browser) 1. King wants to access VIP promotion 2. I heard you want to checkout VIP promotion, are you really king? 3. Yes, I'm the king! 4. Hey, King wants something from you Auth code ID token 5. You mean THE KING? I'm only merchant! 6. Yes, this is his ID 7. I will redirect him to our premium shops and tell he is the king Apps behind proxy
  • 17. Running it on k8s + DEMO 17
  • 19. Other Auth proxy implementations 19 ▰ Keycloak-gatekeeper ▰ Pomerium – zero-trust ▰ Buzzfeed/sso - double Auth proxy
  • 20. K8s API access 20 ▰ Configure k8s API access with OpenID connect and Auth proxy --oidc-issuer-url --oidc-client-id (--oidc-username-claim, --oidc-groups-claim) ▰ Impersonation proxy: https://kccnceu19.sche d.com/event/MPdT ▰ Configure kubectl to act as Auth proxy kubectl config set-credentials USER_NAME --auth-provider=oidc --auth-provider-arg=idp-issuer-url=( issuer url ) --auth-provider-arg=client-id=( your client id ) --auth-provider-arg=client-secret=( your client secret ) --auth-provider-arg=refresh-token=( your refresh token ) --auth-provider-arg=idp-certificate-authority=( path to your ca certificate ) --auth-provider-arg=id-token=( your id_token )
  • 21. Istio – access managment + DEMO 21 ▰ Guards talk to each other in secret language (mTLS) ▰ Guards allow to talk to protected resource only when ordered (policy) ▰ Guards needs assistance to recognize (authenticate) people from outside world > Auth proxy
  • 22. Summary 22 ▰ OAuth2 and OpenID connect are modern standards for AuthZ and AuthN ▰ Auth proxy allows easily incorporating them with your applications ▰ K8s ingress controller can be used to dynamically define Auth proxy redirects ▰ Istio with Auth proxy enables fine-grained access managment
  • 23. References 23 ▰ OAuth 2.0 Threat Model and Security Considerations ▰ Security Best Current Practice ▰ Impersonation proxy talk KubeCon ▰ All configuration files from this presentation are published on https://github.com/m- wcislo/talks
  • 25. Credits Special thanks to all the people who made and released these awesome resources for free: ▰ Presentation template by SlidesCarnival ▰ Photographs by Unsplash 25