You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
📚 Sync docs from alaudadevops/connectors-operator on dfe55c2a5de413ef5aec931197b06af3426004a1
Source: add docs to explain how to pass auth info when using proxy (#273)
Author: chengjingtao
Ref: refs/heads/main
Commit: dfe55c2a5de413ef5aec931197b06af3426004a1
This commit automatically syncs documentation changes from the source-docs repository.
🔗 View source commit: https://github.com/alaudadevops/connectors-operator/commit/dfe55c2a5de413ef5aec931197b06af3426004a1
🤖 Synced on 2025-10-24 10:20:31 UTC
Copy file name to clipboardExpand all lines: docs/en/connectors/concepts/connectors_proxy.mdx
+69-12Lines changed: 69 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,34 +124,91 @@ Custom proxies can point to any address capable of handling proxy requests.
124
124
125
125
### Connectors Proxy Authentication
126
126
127
-
Clients must provide authentication when using Connectors Proxy. Authentication uses ServiceAccount tokens, and the ServiceAccount must have read permissions for the target Connector.
127
+
When using Connectors Proxy, clients must provide proper authentication credentials to access the proxy. The authentication process requires two key elements:
128
128
129
-
**Built-in Forward Proxy Authentication**
129
+
1. **Connector Identification**: Specify which connector to use for credential injection
130
+
2. **Authorization Token**: Provide a ServiceAccount token with read permissions for the target Connector
130
131
131
-
Authentication credentials are passed via `Proxy-Authorization` header:
132
+
The proxy server validates the provided ServiceAccount token to ensure it has the necessary permissions for the specified Connector before processing requests and injects the authentication credentials into the request when valid.
133
+
134
+
For detailed information about ServiceAccount tokens and RBAC configuration, see the [Kubernetes Authentication documentation](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#service-account-tokens).
135
+
136
+
#### Built-in Forward Proxy Authentication
137
+
138
+
For forward proxy mode, authentication information is passed through the `Proxy-Authorization` header using HTTP Proxy Basic Authentication.
Requests through this proxy automatically inject the `default/github` connector's authentication credentials when accessing GitHub services.
160
+
> **Note**: The `%2F` is the URL-encoded form of `/` in the connector namespace/name format.
161
+
162
+
#### Built-in Reverse Proxy Authentication
143
163
144
-
**Built-in Reverse Proxy Authentication**
164
+
For reverse proxy mode, clients connect directly to the connector's proxy address. The authentication token can be provided using either Basic Auth or Bearer Token methods, while connector identification is handled through the connector proxy address.
145
165
146
-
Authentication credentials are passed via Basic Auth:
166
+
##### Basic Authentication
147
167
148
-
- **Username**: Any value
168
+
- **Username**: Any value (ignored)
149
169
- **Password**: ServiceAccount token with read permissions for the Connector
150
170
151
-
**Example**: For a `github` Connector in the `default` namespace:
The connector proxy address is automatically generated by the system and is unique for each connector. You **must** retrieve the connector proxy address from the `status.proxy.httpAddress` field of the connector resource before using it.
195
+
196
+
Example:
197
+
198
+
For a `github` connector in the `default` namespace:
The proxy will validate the authentication token and automatically inject the `default/github` connector's authentication credentials when forwarding requests to GitHub services.
0 commit comments