Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: New landing page #853

Merged
merged 10 commits into from
Nov 9, 2023
Merged

docs: New landing page #853

merged 10 commits into from
Nov 9, 2023

Conversation

dadrus
Copy link
Owner

@dadrus dadrus commented Aug 9, 2023

Related issue(s)

Checklist

Description

When ready, it would update the current landing page with useful information and be hopefully appealing in sense of the layout.

Copy link
Contributor

@netthier netthier left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added mostly nitpicks

docs/content/_index.adoc Outdated Show resolved Hide resolved
- authorizer: opa
----

The decision process can be controlled by each and every upstream service individually via rules, which heimdall can load from different sources, like e.g. from a `RuleSet` kubernetes resource.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure if this is the best way to put this, the decision process isn't "controlled" by the upstream services, it's controlled by the user writing the rules.
Maybe something along the lines of "Create rules for each upstream and path you want to secure, loading them from a variety of sources such as Kubernetes custom resources, S3 buckets or regular files".
Also not sure about using the Kubernetes resource as the primary example, is it the most used configuration type?

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Replaced with your suggestion: "Create rules for each upstream and path you want to secure, loading them from a variety of sources such as Kubernetes custom resources, S3 buckets or regular files"

Copy link
Owner Author

@dadrus dadrus Aug 9, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also not sure about using the Kubernetes resource as the primary example, is it the most used configuration type?

Me neither. Maybe adding an example for e.g. file system is worth it as well and making it clickable e.g. as tabs or alike.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, a comparison like that might be nice


{{% seo title="Reduces the cognitive load of your team" %}}

By outsourcing authentication and authorization decisions to heimdall you can reduce the complexity of your code base, free resources and reduce the cognitive load of your team pretty much.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure if "pretty much" is correct here, sounds a bit awkward. I'd either replace it with something like "substantially" or remove it.

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, you're right. Changed that based on your suggestion.

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reasoning for adding that: I want to highlight that systems like heimdall can help reducing complexity. Actually, reducing is a wrong word. The complexity is there, but you can shift it, making it less problematic for the own code. Or even not having to deal with it at all. This already starts with the gained ability to decide how the service gets informed about the subject, and alike. All of that can make the implementation of the upstream service simpler and also much easier to test.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Definitely agree with the content and I'd argue that if you're using a microservice architecture you are actually actively reducing complexity by centralizing it in one place.

* Use Common Expression Language to implement complex authorization logic within a pipeline
* Use existing authorization systems, like OpenFGA, Ory Keto, Open Policy Agent and many more.
* Use existing authentication systems supporting OpenID Connect or OAuth2
* Combine existing authentication systems
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This point might be worth merging with the pipeline one as "combining existing authentication systems" is nothing more than composing authentication steps in a pipeline.
Not sure about a good way to put it though, maybe adding examples for the kinds of composition possible would be useful.

@dadrus dadrus changed the title wip: Docs landing page docs: New landing page Nov 9, 2023
@dadrus dadrus merged commit fc2a337 into main Nov 9, 2023
20 checks passed
@dadrus dadrus deleted the docs/landing_page branch November 9, 2023 10:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants