You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. If the `shield_id` starts with `inout_`, it will be used both for input and output.
231
240
1. Otherwise, it will be used for input only.
232
241
242
+
## Authentication
243
+
244
+
Currently supported authentication modules are:
245
+
- `k8s`Kubernetes based authentication
246
+
- `jwt-token`JSON Web Token based authentication
247
+
- `noop`No operation authentication (default)
248
+
- `noop-with-token`No operation authentication with token
249
+
250
+
### K8s based authentication
251
+
252
+
K8s based authentication is suitable for running the Lightspeed Stack in Kubernetes environments.
253
+
The user accessing the service must have a valid Kubernetes token and the appropriate RBAC permissions to access the service.
254
+
The user must have `get` permission on the resource path `/ls-access`.
255
+
256
+
Configuring K8s based authentication requires the following steps:
257
+
1. Enable K8s authentication module
258
+
```yaml
259
+
authentication:
260
+
module: "k8s"
261
+
```
262
+
2. Configure the Kubernetes authentication settings.
263
+
When deploying Lightspeed Stack in a Kubernetes cluster, it is not required to specify cluster connection details.
264
+
It automatically picks up the in-cluster configuration or through a kubeconfig file.
265
+
This step is not neccessary.
266
+
When running outside a kubernetes cluster or connecting to external Kubernetes clusters, Lightspeed Stack requires the cluster connection details in the configuration file:
267
+
- `k8s_cluster_api`Kubernetes Cluster API URL. The URL of the K8S/OCP API server where tokens are validated.
268
+
- `k8s_ca_cert_path`Path to the CA certificate file for clusters with self-signed certificates.
269
+
- `skip_tls_verification`Whether to skip TLS verification.
JWK (JSON Web Keyset) based authentication is suitable for scenarios where you need to authenticate users based on tokens. This method is commonly used in web applications and APIs.
281
+
282
+
To configure JWK based authentication, you need to specify the following settings in the configuration file:
283
+
- `module`must be set to `jwk-token`
284
+
- `jwk_config` JWK configuration settings must set at least `url` field:
0 commit comments