f95096ea62 | ||
---|---|---|
.github/workflows | ||
AutoGeneratedFiles | ||
AutomationScripts | ||
TemplateFiles | ||
charts/easyauth-proxy | ||
docs | ||
sample | ||
src | ||
.gitignore | ||
CODE_OF_CONDUCT.md | ||
Dockerfile | ||
LICENSE | ||
README.md | ||
SECURITY.md | ||
main.sh | ||
test.sh |
README.md
EasyAuth for Kubernetes
EasyAuth for Kubernetes is a simple Identity and Access Management module that allows you to protect applications in a kubernetes cluster without having to modify application source code.
Similar to the security features of Azure App Service, EasyAuth for Kubernetes is designed to do four basic functions:
- Authenticate callers via Azure Active Directory
- Authorize callers based on required roles or scopes
- Manage authenticated sessions
- Inject basic information about the user into the request received by your application
EasyAuth uses Azure AD v2 endpoints, which allows you leverage all features of the Microsoft Identity Platform.
A few of these features include:
- Authenticating employees or business partners
- Azure AD B2C custom policies for complex identity flows
- MFA and conditional access
- Role-based access control
- Multitenant applications
Concepts
EasyAuth for Kubernetes integrates with your cluster's ingress controller. When a request is received, the EasyAuth service validates the user's session. If the caller isn't authenticated yet, the service will route the caller to the appropriate Azure AD tenant to sign in. The service then starts a managed session for the user and adds a cookie to the response that will be used to authenticate the caller on future requests.
Note: The authentication flow supports single sign on, so the user will not be prompted for credentials if they are already signed via the Azure AD tenant.
The diagram above conveys the basic interaction between the components for a user accessing a web application. For simplicity, this shows a single protected application and a single EasyAuth service. You can, however, configure as many EasyAuth services as you would like within your cluster. Each service can protect one or more applications, and have different Azure AD tenant configurations.
For example, you could have one set of applications accessible only by internal employees and another set of applications for customers or external users all running in the same cluster and using the same ingress controller.
Quickstart using Azure Cloud Shell
Try it out by setting up a new AKS cluster with a sample application that uses EasyAuth. Launch Cloud Shell, then run the following bash commands:
git clone https://github.com/Azure/EasyAuthForK8s.git
cd EasyAuthForK8s
# Hint - run bash main.sh -h for parameter help
# Note: AAD app name (-a) must be *globally* unique
# Note: Cluster name (-c) must be unique
# Estimated Runtime: 15 minutes
bash main.sh -a {insert-unique-app-name} -c {insert-unique-cluster-name} -r easy-auth -e email@contoso.com -l eastus
What the quickstart script does:
- Deploy an AKS cluster
- Install an Nginx Ingress controller
- Configure DNS for the cluster public IP
- Register an AAD Application
- Install Cert Manager
- Deploy the Easy Auth Proxy
- Deploy the Application
Documentation
- Setup Instructions - step-by-step guide to building a cluster, configuring the ingress controller, and deploying an application protected by EasyAuth
- Deploy to an Existing Cluster - an in-depth guide to deploying EasyAuth to an existing cluster and application
- Detailed Architecture - an in-depth guide to how EasyAuth works
- Calling a Protected API - how to authenticate a client application and call an API protected by EasyAuth
- Http Headers - Get information about the user that is accessing your application
- Proxy Configuration - an in-depth guide to configure the proxy
Contributing
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.