Skip to content
This repository has been archived by the owner on May 7, 2024. It is now read-only.

adding basic auth support in the konga dashboard , #65

Closed
wants to merge 1 commit into from

Conversation

rgplvr
Copy link

@rgplvr rgplvr commented May 25, 2017

basic auth is to protect the kong dash board urls from
directly accessed and making changes to the service and thereby
the changes are restricted only via the dashboard. incase the basic
auth is disabled there is nothing to do other than the installation steps
and the changes inject the basic auth header to the kong from server to server
thereby leakage of such credentials are also wont happen, this is done by injecting
the basic auth header to the kong apis dynamically.

basic auth is to protect the kong dash board urls from
directly accessed and making changes to the service and thereby
the changes are restricted only via the dashboard. incase the basic
auth is disabled there is nothing to do other than the installation steps
and the changes inject the basic auth header to the kong from server to server
 thereby leakage of such credentials are also wont happen, this is done by injecting
 the basic auth header to the kong apis dynamically.
@pantsel
Copy link
Owner

pantsel commented May 27, 2017

@rajagopalvreghunath thanks for the contribution!

This feature is already introduced in Konga next which will be the next release with the exception that it uses an apikey and you can set it for each admin URL individually.

Check it out, or if you're using docker, pull pantsel/konga:next.

Thanks again!

@rgplvr
Copy link
Author

rgplvr commented May 27, 2017

This merge is to avoid sharing the api keys with the non admin users and to avoid the kong admin urls being accessed outside konga, More over am trying to add role based access control into konga which allow editors/viewers and admins so that it will allow konga to be used as a full fledged access system for kong

@pantsel
Copy link
Owner

pantsel commented May 28, 2017

Hi @rajagopalvreghunath ,

with the addition of api keys in v0.7.3, the kong admin urls won't be accessed outside konga (provided that kong's admin port 8001 is not publicly accessible) in addition of implemeting a "loop-back" API as described here. Each Kong installation should have it's own "loop-back" API and konga will have to use a different apikey for speaking to them.

Apart from that, as you can see, Konga's ACL is very basic. That's because it didn't feel important to me at the time i started development. I mean, why would someone have access to Konga if not to manage a Kong instance? Just to READ the APIs, consumers, plugins and not being able to modify them?

That's the way i think about it at least but i might by wrong and I'm surely open to debate.

Can you please elaborate on what you have in mind when saying

full fledged access system for kong ?

How do you visualize it with roles and what would each role's permissions be on the GUI and Kong's admin API itself?

@rgplvr
Copy link
Author

rgplvr commented May 30, 2017 via email

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants