|
You are here |
ectobit.com | ||
| | | | |
xvnpw.github.io
|
|
| | | | | In my previous post about Apache APISIX I have found path traversal in uri-blocker plugin. In this text I will focus on yet another ingress controller which is Traefik. It has feature called forward auth. At the end I will mention HAProxy ingress controller. | |
| | | | |
blog.nobugware.com
|
|
| | | | | Following my earlier post about Traefik 2 and Kubernetes, here are some advanced configuration examples and a full yaml example at the end of this post: Protecting a route with a password Create an htpasswd file named users for a user admin htpasswd -c users admin Use kubectl to create the secret (easier for multi lines file). kubectl create secret generic admin-authsecret --from-file=users Create a middleware for authentication: apiVersion: traefik.containo.us/v1alpha1 kind: Middleware metadata: name: a... | |
| | | | |
blog.mariom.pl
|
|
| | | | | There is an easy way to use base-auth for securing ingress access in Traefik, but, well - its base auth. Its not that secure nor easy / nice to use in browsers, especially on mobile devices. So for long time, I was thinking how to integrate Traefik Ingress with an SSO (Single Sign-On) solution. Prerequisites You will need some kind of SSO provider. Im using Forgejo (a fork of Gitea). I didnt need anything fancy, and I already had Gitea working, which had the OAuth2 provider out of the box. | |
| | | | |
www.architect.io
|
|
| | | Learn to build a Go service and deploy it to a Kubernetes cluster in AWS | ||