Expose and secure a workload with OAuth2

This tutorial shows how to expose and secure services or Functions using API Gateway Controller. The controller reacts to an instance of the APIRule custom resource (CR) and creates an Istio VirtualService and Oathkeeper Access Rules according to the details specified in the CR.

Prerequisites

  • Deploy a sample HttpBin service and a sample Function.
  • Set up your custom domain or use a Kyma domain instead.
  • Depending on whether you use your custom domain or a Kyma domain, export the necessary values as environment variables:

    • Custom domain
    • Kyma domain
    Click to copy
    export DOMAIN_TO_EXPOSE_WORKLOADS={DOMAIN_NAME}
    export GATEWAY=$NAMESPACE/httpbin-gateway
  • Configure your client ID and client secret using an OAuth2-compliant provider. Then, export the following values as environment variables:

    Click to copy
    export CLIENT_ID={CLIENT_ID}
    export CLIENT_SECRET={CLIENT_SECRET}
    export TOKEN_URL={TOKEN_URL}
    export INTROSPECTION_URL={INTROSPECTION_URL}

Get the tokens

  1. Encode the client's credentials and export them as environment variables:

    Click to copy
    export ENCODED_CREDENTIALS=$(echo -n "$CLIENT_ID:$CLIENT_SECRET" | base64)
  2. Get tokens to interact with secured resources using the client credentials flow:

    • Token with `read` scope
    • Token with `write` scope
    • Export the following value as an environment variable:
      Click to copy
      export KYMA_DOMAIN={KYMA_DOMAIN_NAME}
    • Get the opaque token:
      Click to copy
      curl --location --request POST "$TOKEN_URL?grant_type=client_credentials" --header "Content-Type: application/x-www-form-urlencoded" --header "Authorization: Basic $ENCODED_CREDENTIALS"
    • Export the issued token as an environment variable:

      Click to copy
      export ACCESS_TOKEN_READ={ISSUED_READ_TOKEN}

Expose and secure your workload

Follow the instructions to expose an instance of the HttpBin service or a sample Function, and secure them with Oauth2 scopes.

  • HttpBin
  • Function
  1. Expose the service and secure it by creating an APIRule CR in your Namespace. Run:

    Click to copy
    cat <<EOF | kubectl apply -f -
    apiVersion: gateway.kyma-project.io/v1beta1
    kind: APIRule
    metadata:
    name: httpbin
    namespace: $NAMESPACE
    spec:
    gateway: $GATEWAY
    host: httpbin.$DOMAIN_TO_EXPOSE_WORKLOADS
    service:
    name: httpbin
    port: 8000
    rules:
    - path: /.*
    methods: ["GET"]
    accessStrategies:
    - handler: oauth2_introspection
    config:
    required_scope: ["read"]
    introspection_url: "$INTROSPECTION_URL"
    introspection_request_headers:
    Authorization: "Basic $ENCODED_CREDENTIALS"
    - path: /post
    methods: ["POST"]
    accessStrategies:
    - handler: oauth2_introspection
    config:
    required_scope: ["write"]
    introspection_url: "$INTROSPECTION_URL"
    introspection_request_headers:
    Authorization: "Basic $ENCODED_CREDENTIALS"
    EOF

    NOTE: If you are running Kyma on k3d, add httpbin.kyma.local to the entry with k3d IP in your system's /etc/hosts file.

    The exposed service requires tokens with read scope for GET requests in the entire service, and tokens with write scope for POST requests to the /post endpoint of the service.

CAUTION: When you secure a workload, don't create overlapping Access Rules for paths. Doing so can cause unexpected behavior and reduce the security of your implementation.

Access the secured resources

Follow the instructions to call the secured service or Functions using the tokens issued for the client you registered.

  • HttpBin
  • Function
  1. Send a GET request with a token that has the read scope to the HttpBin service:

    Click to copy
    curl -ik -X GET https://httpbin.$DOMAIN_TO_EXPOSE_WORKLOADS/headers -H "Authorization: Bearer $ACCESS_TOKEN_READ"
  2. Send a POST request with a token that has the write scope to the HttpBin's /post endpoint:

    Click to copy
    curl -ik -X POST https://httpbin.$DOMAIN_TO_EXPOSE_WORKLOADS/post -d "test data" -H "Authorization: bearer $ACCESS_TOKEN_WRITE"

    If successful, the call returns the code 200 OK response. If you call the service without a token, you get the code 401 response. If you call the service or its secured endpoint with a token with the wrong scope, you get the code 403 response.

To learn more about the security options, read the document describing authorization configuration.