Kuadrant Auth¶
A Kuadrant AuthPolicy custom resource:
- Targets Gateway API networking resources such as HTTPRoutes and Gateways, using these resources to obtain additional context, i.e., which traffic workload (HTTP attributes, hostnames, user attributes, etc) to enforce auth.
- Supports targeting subsets (sections) of a network resource to apply the auth rules to.
- Abstracts the details of the underlying external authorization protocol and configuration resources, that have a much broader remit and surface area.
- Enables cluster operators to set defaults that govern behavior at the lower levels of the network, until a more specific policy is applied.
How it works¶
Envoy's External Authorization Protocol¶
Kuadrant's Auth implementation relies on the Envoy's External Authorization protocol. The workflow per request goes:
1. On incoming request, the gateway checks the matching rules for enforcing the auth rules, as stated in the AuthPolicy custom resources and targeted Gateway API networking objects
2. If the request matches, the gateway sends one CheckRequest to the external auth service ("Authorino").
3. The external auth service responds with a CheckResponse back to the gateway with either an OK
or DENIED
response code.
An AuthPolicy and its targeted Gateway API networking resource contain all the statements to configure both the ingress gateway and the external auth service.
The AuthPolicy custom resource¶
Overview¶
The AuthPolicy
spec includes the following parts:
- A reference to an existing Gateway API resource (
spec.targetRef
) - Authentication/authorization scheme (
spec.rules
) - Top-level route selectors (
spec.routeSelectors
) - Top-level additional conditions (
spec.when
) - List of named patterns (
spec.patterns
)
The auth scheme specify rules for:
* Authentication (spec.rules.authentication
)
* External auth metadata fetching (spec.rules.metadata
)
* Authorization (spec.rules.authorization
)
* Custom response items (spec.rules.response
)
* Callbacks (spec.rules.callbacks
)
Each auth rule can declare specific routeSelectors
and when
conditions for the rule to apply.
The auth scheme (rules
), as well as conditions and named patterns can be declared at the top-level level of the spec (with the semantics of defaults) or alternatively within explicit defaults
or overrides
blocks.
High-level example and field definition¶
apiVersion: kuadrant.io/v1beta2
kind: AuthPolicy
metadata:
name: my-auth-policy
spec:
# Reference to an existing networking resource to attach the policy to. REQUIRED.
# It can be a Gateway API HTTPRoute or Gateway resource.
# It can only refer to objects in the same namespace as the AuthPolicy.
targetRef:
group: gateway.networking.k8s.io
kind: HTTPRoute / Gateway
name: myroute / mygateway
# Selectors of HTTPRouteRules within the targeted HTTPRoute that activate the AuthPolicy.
# Each element contains a HTTPRouteMatch object that will be used to select HTTPRouteRules that include at least
# one identical HTTPRouteMatch.
# The HTTPRouteMatch part does not have to be fully identical, but the what's stated in the selector must be
# identically stated in the HTTPRouteRule.
# Do not use it on AuthPolicies that target a Gateway.
routeSelectors:
- matches:
- path:
type: PathPrefix
value: "/admin"
# Additional dynamic conditions to trigger the AuthPolicy.
# Use it for filtering attributes not supported by HTTPRouteRule or with AuthPolicies that target a Gateway.
# Check out https://github.com/Kuadrant/architecture/blob/main/rfcs/0002-well-known-attributes.md to learn more
# about the Well-known Attributes that can be used in this field.
# Equivalent to if otherwise declared within `defaults`.
when: […]
# Sets of common patterns of selector-operator-value triples, to be referred by name in `when` conditions
# and pattern-matching rules. Often employed to avoid repetition in the policy.
# Equivalent to if otherwise declared within `defaults`.
patterns: {…}
# The auth rules to apply to the network traffic routed through the targeted resource.
# Equivalent to if otherwise declared within `defaults`.
rules:
# Authentication rules to enforce.
# At least one config must evaluate to a valid identity object for the auth request to be successful.
# If omitted or empty, anonymous access is assumed.
authentication:
"my-authn-rule":
# The authentication method of this rule.
# One-of: apiKey, jwt, oauth2Introspection, kubernetesTokenReview, x509, plain, anonymous.
apiKey: {…}
# Where credentials are required to be passed in the request for authentication based on this rule.
# One-of: authorizationHeader, customHeader, queryString, cookie.
credentials:
authorizationHeader:
prefix: APIKEY
# Rule-level route selectors.
routeSelectors: […]
# Rule-level additional conditions.
when: […]
# Configs for caching the resolved object returned out of evaluating this auth rule.
cache: {…}
# Rules for fetching auth metadata from external sources.
metadata:
"my-external-source":
# The method for fetching metadata from the external source.
# One-of: http: userInfo, uma.
http: {…}
# Authorization rules to enforce.
# All policies must allow access for the auth request be successful.
authorization:
"my-authz-rule":
# The authorization method of this rule.
# One-of: patternMatching, opa, kubernetesSubjectAccessReview, spicedb.
opa: {…}
# Customizations to the authorization response.
response:
# Custom denial status and other HTTP attributes for unauthenticated requests.
unauthenticated: {…}
# Custom denial status and other HTTP attributes for unauhtorized requests.
unauthorized: {…}
# Custom response items when access is granted.
success:
# Custom response items wrapped as HTTP headers to be injected in the request
headers:
"my-custom-header":
# One-of: plain, json, wristband.
plain: {…}
# Custom response items wrapped as envoy dynamic metadata.
dynamicMetadata:
# One-of: plain, json, wristband.
"my-custom-dyn-metadata":
json: {…}
# Rules for post-authorization callback requests to external services.
# Triggered regardless of the result of the authorization request.
callbacks:
"my-webhook":
http: {…}
# Explicit defaults. Used in policies that target a Gateway object to express default rules to be enforced on
# routes that lack a more specific policy attached to.
# Mutually exclusive with `overrides` and with declaring the `rules`, `when` and `patterns` at the top-level of
# the spec.
defaults:
rules:
authentication: {…}
metadata: {…}
authorization: {…}
response: {…}
callbacks: {…}
when: […]
patterns: {…}
# Overrides. Used in policies that target a Gateway object to be enforced on all routes linked to the gateway,
# thus also overriding any more specific policy occasionally attached to any of those routes.
# Mutually exclusive with `defaults` and with declaring `rules`, `when` and `patterns` at the top-level of
# the spec.
overrides:
rules:
authentication: {…}
metadata: {…}
authorization: {…}
response: {…}
callbacks: {…}
when: […]
patterns: {…}
Check out the API reference for a full specification of the AuthPolicy CRD.
Using the AuthPolicy¶
Targeting a HTTPRoute networking resource¶
When an AuthPolicy targets a HTTPRoute, the policy is enforced to all traffic routed according to the rules and hostnames specified in the HTTPRoute, across all Gateways referenced in the spec.parentRefs
field of the HTTPRoute.
The targeted HTTPRoute's rules and/or hostnames to which the policy must be enforced can be filtered to specific subsets, by specifying the routeSelectors
field of the AuthPolicy spec.
Target a HTTPRoute by setting the spec.targetRef
field of the AuthPolicy as follows:
apiVersion: kuadrant.io/v1beta2
kind: AuthPolicy
metadata:
name: my-route-auth
spec:
targetRef:
group: gateway.networking.k8s.io
kind: HTTPRoute
name: <HTTPRoute Name>
rules: {…}
┌───────────────────┐ ┌────────────────────┐
│ (Infra namespace) │ │ (App namespace) │
│ │ │ │
│ ┌─────────┐ │ parentRefs │ ┌───────────┐ │
│ │ Gateway │◄─────┼─────────────┼──┤ HTTPRoute │ │
│ └─────────┘ │ │ └───────────┘ │
│ │ │ ▲ │
│ │ │ │ │
│ │ │ │ │
│ │ │ │ targetRef │
│ │ │ │ │
│ │ │ ┌─────┴──────┐ │
│ │ │ │ AuthPolicy │ │
│ │ │ └────────────┘ │
│ │ │ │
└───────────────────┘ └────────────────────┘
Hostnames and wildcards¶
If an AuthPolicy targets a route defined for *.com
and another AuthPolicy targets another route for api.com
, the Kuadrant control plane will not merge these two AuthPolicies. Rather, it will mimic the behavior of gateway implementation by which the "most specific hostname wins", thus enforcing only the corresponding applicable policies and auth rules.
E.g., a request coming for api.com
will be protected according to the rules from the AuthPolicy that targets the route for api.com
; while a request for other.com
will be protected with the rules from the AuthPolicy targeting the route for *.com
.
Example with 3 AuthPolicies and 3 HTTPRoutes:
- AuthPolicy A → HTTPRoute A (a.toystore.com
)
- AuthPolicy B → HTTPRoute B (b.toystore.com
)
- AuthPolicy W → HTTPRoute W (*.toystore.com
)
Expected behavior:
- Request to a.toystore.com
→ AuthPolicy A will be enforced
- Request to b.toystore.com
→ AuthPolicy B will be enforced
- Request to other.toystore.com
→ AuthPolicy W will be enforced
Targeting a Gateway networking resource¶
An AuthPolicy that targets a Gateway can declare a block of defaults (spec.defaults
) or a block of overrides (spec.overrides
). As a standard, gateway policies that do not specify neither defaults nor overrides, act as defaults.
When declaring defaults, an AuthPolicy which targets a Gateway will be enforced to all HTTP traffic hitting the gateway, unless a more specific AuthPolicy targeting a matching HTTPRoute exists. Any new HTTPRoute referrencing the gateway as parent will be automatically covered by the default AuthPolicy, as well as changes in the existing HTTPRoutes.
Defaults provide cluster operators with the ability to protect the infrastructure against unplanned and malicious network traffic attempt, such as by setting preemptive "deny-all" policies on hostnames and hostname wildcards.
Inversely, a gateway policy that specify overrides declares a set of rules to be enforced on all routes attached to the gateway, thus atomically replacing any more specific policy occasionally attached to any of those routes.
Target a Gateway HTTPRoute by setting the spec.targetRef
field of the AuthPolicy as follows:
apiVersion: kuadrant.io/v1beta2
kind: AuthPolicy
metadata:
name: my-gw-auth
spec:
targetRef:
group: gateway.networking.k8s.io
kind: Gateway
name: <Gateway Name>
defaults: # alternatively: `overrides`
rules: {…}
┌───────────────────┐ ┌────────────────────┐
│ (Infra namespace) │ │ (App namespace) │
│ │ │ │
│ ┌─────────┐ │ parentRefs │ ┌───────────┐ │
│ │ Gateway │◄─────┼─────────────┼──┤ HTTPRoute │ │
│ └─────────┘ │ │ └───────────┘ │
│ ▲ │ │ ▲ │
│ │ │ │ │ │
│ │ │ │ │ │
│ │ targetRef │ │ │ targetRef │
│ │ │ │ │ │
│ ┌─────┴──────┐ │ │ ┌─────┴──────┐ │
│ │ AuthPolicy │ │ │ │ AuthPolicy │ │
│ └────────────┘ │ │ └────────────┘ │
│ │ │ │
└───────────────────┘ └────────────────────┘
Overlapping Gateway and HTTPRoute AuthPolicies¶
Two possible semantics are to be considered here – gateway policy defaults vs gateway policy overrides.
Gateway AuthPolicies that declare defaults (or alternatively neither defaults nor overrides) protect all traffic routed through the gateway except where a more specific HTTPRoute AuthPolicy exists, in which case the HTTPRoute AuthPolicy prevails.
Example with 4 AuthPolicies, 3 HTTPRoutes and 1 Gateway default (plus 2 HTTPRoute and 2 Gateways without AuthPolicies attached):
- AuthPolicy A → HTTPRoute A (a.toystore.com
) → Gateway G (*.com
)
- AuthPolicy B → HTTPRoute B (b.toystore.com
) → Gateway G (*.com
)
- AuthPolicy W → HTTPRoute W (*.toystore.com
) → Gateway G (*.com
)
- AuthPolicy G (defaults) → Gateway G (*.com
)
Expected behavior:
- Request to a.toystore.com
→ AuthPolicy A will be enforced
- Request to b.toystore.com
→ AuthPolicy B will be enforced
- Request to other.toystore.com
→ AuthPolicy W will be enforced
- Request to other.com
(suppose a route exists) → AuthPolicy G will be enforced
- Request to yet-another.net
(suppose a route and gateway exist) → No AuthPolicy will be enforced
Gateway AuthPolicies that declare overrides protect all traffic routed through the gateway, regardless of existence of any more specific HTTPRoute AuthPolicy.
Example with 4 AuthPolicies, 3 HTTPRoutes and 1 Gateway override (plus 2 HTTPRoute and 2 Gateways without AuthPolicies attached):
- AuthPolicy A → HTTPRoute A (a.toystore.com
) → Gateway G (*.com
)
- AuthPolicy B → HTTPRoute B (b.toystore.com
) → Gateway G (*.com
)
- AuthPolicy W → HTTPRoute W (*.toystore.com
) → Gateway G (*.com
)
- AuthPolicy G (overrides) → Gateway G (*.com
)
Expected behavior:
- Request to a.toystore.com
→ AuthPolicy G will be enforced
- Request to b.toystore.com
→ AuthPolicy G will be enforced
- Request to other.toystore.com
→ AuthPolicy G will be enforced
- Request to other.com
(suppose a route exists) → AuthPolicy G will be enforced
- Request to yet-another.net
(suppose a route and gateway exist) → No AuthPolicy will be enforced
Route selectors¶
Route selectors allow targeting sections of a HTTPRoute, by specifying sets of HTTPRouteMatches and/or hostnames that make the policy controller look up within the HTTPRoute spec for compatible declarations, and select the corresponding HTTPRouteRules and hostnames, to then build conditions that activate the policy or policy rule.
Check out Route selectors for a full description, semantics and API reference.
when
conditions¶
when
conditions can be used to scope an AuthPolicy or auth rule within an AuthPolicy (i.e. to filter the traffic to which a policy or policy rule applies) without any coupling to the underlying network topology, i.e. without making direct references to HTTPRouteRules via routeSelectors
.
Use when
conditions to conditionally activate policies and policy rules based on attributes that cannot be expressed in the HTTPRoutes' spec.hostnames
and spec.rules.matches
fields, or in general in AuthPolicies that target a Gateway.
when
conditions in an AuthPolicy are compatible with Authorino conditions, thus supporting complex boolean expressions with AND and OR operators, as well as grouping.
The selectors within the when
conditions of an AuthPolicy are a subset of Kuadrant's Well-known Attributes (RFC 0002). Check out the reference for the full list of supported selectors.
Authorino JSON path string modifiers can also be applied to the selectors within the when
conditions of an AuthPolicy.
Examples¶
Check out the following user guides for examples of protecting services with Kuadrant: * Enforcing authentication & authorization with Kuadrant AuthPolicy, for app developers and platform engineers * Authenticated Rate Limiting for Application Developers * Authenticated Rate Limiting with JWTs and Kubernetes RBAC
Known limitations¶
- One HTTPRoute can only be targeted by one AuthPolicy.
- One Gateway can only be targeted by one AuthPolicy.
- AuthPolicies can only target HTTPRoutes/Gateways defined within the same namespace of the AuthPolicy.
- 2+ AuthPolicies cannot target network resources that define/inherit the same exact hostname.
Limitation: Multiple network resources with identical hostnames¶
Kuadrant currently does not support multiple AuthPolicies simultaneously targeting network resources that declare identical hostnames. This includes multiple HTTPRoutes that specify the same hostnames in the spec.hostnames
field, as well as HTTPRoutes that specify a hostname that is identical to a hostname specified in a listener of one of the route's parent gateways or HTTPRoutes that don't specify any hostname at all thus inheriting the hostnames from the parent gateways. In any of these cases, a maximum of one AuthPolicy targeting any of those resources that specify identical hostnames is allowed.
Moreover, having multiple resources that declare identical hostnames may lead to unexpected behavior and therefore should be avoided.
This limitation is rooted at the underlying components configured by Kuadrant for the implementation of its policies and the lack of information in the data plane regarding the exact route that is honored by the API gateway at each specific request, in cases of conflicting hostnames.
To exemplify one way this limitation can impact deployments, consider the following topology:
┌──────────────┐
│ Gateway │
├──────────────┤
┌─────►│ listeners: │◄──────┐
│ │ - host: *.io │ │
│ └──────────────┘ │
│ │
│ │
┌─────────┴─────────┐ ┌──────────┴────────┐
│ HTTPRoute │ │ HTTPRoute │
│ (route-a) │ │ (route-b) │
├───────────────────┤ ├───────────────────┤
│ hostnames: │ │ hostnames: │
│ - app.io │ │ - app.io │
│ rules: │ │ rules: │
│ - matches: │ │ - matches: │
│ - path: │ │ - path: │
│ value: /foo │ │ value: /bar │
└───────────────────┘ └───────────────────┘
▲ ▲
│ │
┌─────┴──────┐ ┌─────┴──────┐
│ AuthPolicy │ │ AuthPolicy │
│ (policy-1) │ │ (policy-2) │
└────────────┘ └────────────┘
In the example above, with the policy-1
resource created before policy-2
, policy-1
will be enforced on all requests to app.io/foo
while policy-2
will be rejected. I.e. app.io/bar
will not be secured. In fact, the status conditions of policy-2
shall reflect Enforced=false
with message "AuthPolicy has encountered some issues: AuthScheme is not ready yet".
Notice the enforcement of policy-1
and no enforcement of policy-2
is the opposite behavior as the analogous problem with the Kuadrant RateLimitPolicy.
A slightly different way the limitation applies is when two or more routes of a gateway declare the exact same hostname and a gateway policy is defined with expectation to set default rules for the cases not covered by more specific policies. E.g.:
┌────────────┐
┌──────────┤ AuthPolicy │
│ │ (policy-2) │
▼ └────────────┘
┌──────────────┐
│ Gateway │
├──────────────┤
┌─────►│ listeners: │◄──────┐
│ │ - host: *.io │ │
│ └──────────────┘ │
│ │
│ │
┌─────────┴─────────┐ ┌──────────┴────────┐
│ HTTPRoute │ │ HTTPRoute │
│ (route-a) │ │ (route-b) │
├───────────────────┤ ├───────────────────┤
│ hostnames: │ │ hostnames: │
│ - app.io │ │ - app.io │
│ rules: │ │ rules: │
│ - matches: │ │ - matches: │
│ - path: │ │ - path: │
│ value: /foo │ │ value: /bar │
└───────────────────┘ └───────────────────┘
▲
│
┌─────┴──────┐
│ AuthPolicy │
│ (policy-1) │
└────────────┘
Once again, requests to app.io/foo
will be protected under AuthPolicy policy-1
, while requests to app.io/bar
will not be protected under any policy at all, unlike expected gateway policy policy-2
enforced as default. Both policies will report status condition as Enforced
nonetheless.
To avoid these problems, use different hostnames in each route.
Implementation details¶
Under the hood, for each AuthPolicy, Kuadrant creates an Istio AuthorizationPolicy
and an Authorino AuthConfig
custom resources.
Only requests that matches the rules in the Istio AuthorizationPolicy
cause an authorization request to be sent to the external authorization service ("Authorino"), i.e., only requests directed to the HTTPRouteRules targeted by the AuthPolicy (directly or indirectly), according to the declared top-level route selectors (if present), or all requests for which a matching HTTPRouteRule exists (otherwise).
Authorino looks up for the auth scheme (AuthConfig
custom resource) to enforce using the provided hostname of the original request as key. It then checks again if the request matches at least one of the selected HTTPRouteRules, in which case it enforces the auth scheme.
Exception to the rule
Due to limitations imposed by the Istio `AuthorizationPolicy`, there are a few patterns of HTTPRouteRules that cannot be translated to filters for the external authorization request. Therefore, the following patterns used in HTTPRouteMatches of top-level route selectors of an AuthPolicy will not be included in the Istio AuthorizationPolicy rules that trigger the check request with Authorino: `PathMatchRegularExpression`, `HeaderMatchRegularExpression`, and `HTTPQueryParamMatch`. As a consequence to the above, requests that do not match these rules and otherwise would not be checked with Authorino will result in a request to the external authorization service. Authorino nonetheless will still verify those patterns and ensure the auth scheme is enforced only when it matches a selected HTTPRouteRule. Users of Kuadrant may observe an unnecessary call to the authorization service in those cases where the request is out of the scope of the AuthPolicy and therefore always authorized.Internal custom resources and namespaces¶
While the Istio AuthorizationPolicy
needs to be created in the same namespace as the gateway workload, the Authorino AuthConfig
is created in the namespace of the AuthPolicy
itself. This allows to simplify references such as to Kubernetes Secrets referred in the AuthPolicy, as well as the RBAC to support the architecture.