You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
doc: user auth configuration docs and explanation (#217)
* doc: user auth configuration docs and explanation
* fixup! doc: user auth configuration docs and explanation
* Update doc-site/docs/components/kubernetes/user-auth.md
Co-authored-by: Bill Monkman <[email protected]>
Co-authored-by: Bill Monkman <[email protected]>
Copy file name to clipboardExpand all lines: doc-site/docs/components/kubernetes/user-auth.md
+49-2Lines changed: 49 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,14 +45,61 @@ The default setup uses an Authenticator handler: [`cookie_session`][oathkeeper-c
45
45
- Oathkeeper rules
46
46
- jwks_private_key (Oathkeeper uses this key to sign session tokens)
47
47
48
-
## Documentation
48
+
## Configuring
49
+
The default values can be overriden using the variable `kratos_values_override` and `oathkeeper_values_override`. You can pass in an object that is a subset of the Kratos or Oathkeeper config in the same nesting level and it will merge with the default values.
50
+
51
+
### Overriding Kratos config
52
+
For example if you want to change the Kratos error UI page you can override it as follows:
These config get mounted during deployment under `/etc/config` in the deployment from [Helm Charts][kratos-helm-deployment]
75
+
76
+
### Oathkeeper Proxy Rules
77
+
Oathkeeper rules are how you control auth decision making and routing through the proxy. Requests coming into the proxy only do something if they match a rule.
78
+
Each rule must have a **unique pattern matching string** (glob/regexp) and you can define which [handlers it must go through](https://www.ory.sh/oathkeeper/docs/pipeline) (Authenticators, Authorizers, Mutators, Error handlers), then at the end it can have an upstream service which is the destination of the requests (most likely your service).
79
+
80
+
:::caution
81
+
Incoming requests must match exactly 1 rule or Oathkeeper will throw an error.
82
+
:::
83
+
84
+
#### Zero's Proxy Rules setup
85
+
In our default setup there are 4 rules
86
+
87
+
| Name/Upstream | Routes | Purpose |
88
+
| ---- | ----- | ------- |
89
+
| Public Kratos |`/.ory/kratos/public`| Self serve auth flows to facilitate forms and redirects |
90
+
| Admin Kratos |`/.ory/kratos/`| Handling request life cycle, only allows GET from external, other calls can be made internally in your cluster |
91
+
| Backend public |`<(public\|webhook)\/.*>`| Public endpoints with no auth requirements |
92
+
| Authenticated public |`<(?!(public\|webhook\|\.ory\/kratos)).*>`| Authenticated endpoints |
93
+
94
+
### Documentation
49
95
-[Terraform implementation and Documentation][commit-zero-aws/user-auth]
50
96
-[ORY Kratos's][kratos-docs] and [Oathkeeper's][oathkeeper-docs] documentation.
0 commit comments