Configuring RequestAuthorization
In the previous section, we configured a RequestAuthentication
policy, which verifies a JWT token against the issuer and JWK details as per the JWKS location. We configured Auth0 as the authentication provider and the one that generates the bearer token. In this section, we will learn about how to make use of the information provided by authentication policies such as peer authentication and request authentication to authorize client access to the server (the requested resource, Pod, workload, service, etc.).
We will first focus on implementing an authorization policy in conjunction with the RequestAuthentication
policy from the previous section.
To let curl
access the envoy dummy using the access token issued by Auth0, we need to create an AuthorizationPolicy
:
apiVersion: "security.istio.io/v1beta1" kind: "AuthorizationPolicy" metadata: name: "envoydummy-authz-policy" namespace: utilities...