-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authservice should ignore specified paths and not redirect to the IDP for authentication #62
Comments
It appears that you can configure the ext_authz filter to be skipped based on paths, so maybe the authservice does not need to also this kind of configuration option itself? |
We tried using Istio's We were allowed to use a MERGE operation with applyTo VIRTUAL_HOST to insert a route into the default virtual host, but it always merges by inserting it at the end of the array, and we need it to be at the start of the array because the default is for path "/" and we want to put more specific paths in the array before that. The docs say that INSERT_BEFORE is not supported with an applyTo HTTP_ROUTE or ROUTE_CONFIGURATION (see https://istio.io/docs/reference/config/networking/envoy-filter/#EnvoyFilter-ApplyTo). It seems like we do need a feature in the authservice's config to skip auth for certain paths. Note that the Istio JWT filter has a similar configuration option (see When the Istio authn policy is applied, Pilot translates it into an envoy filter chain which has an |
- New `trigger_rules` configuration option - Only run the OIDC filter code when the request path matches a trigger rule - We borrowed some of the matching code from Istio's Authentication Policy's C++ implementation [Fixes #62] Signed-off-by: Peter Chen <pchen@pivotal.io>
Traffic for configured paths and methods (e.g. GET /health) should be allowed to pass the authservice without being redirected to the IDP. For instance an application's marketing landing page or health endpoint may not require a user be logged in to view it.
Both the Istio authn policy and the authz policies (both the deprecated RBAC authz policy and the new authz policy) already allow excluding paths and methods.
The text was updated successfully, but these errors were encountered: