mirror of https://github.com/istio/istio.io.git
Add open source OIDC providers to security page (#2689)
Adds open source OIDC providers ORY Hydra and Keycloak to the securit overview page. Closes #2687
This commit is contained in:
parent
9885a6c0e0
commit
60421f4e40
|
|
@ -522,6 +522,8 @@ VirtualService
|
|||
sha256
|
||||
deployment
|
||||
webhook
|
||||
Keycloak
|
||||
OpenID
|
||||
|
||||
- search.md
|
||||
searchresults
|
||||
|
|
|
|||
|
|
@ -224,7 +224,10 @@ Istio provides two types of authentication:
|
|||
- **Origin authentication**, also known as **end-user authentication**: verifies the
|
||||
original client making the request as an end-user or device.
|
||||
Istio enables request-level authentication with JSON Web Token (JWT) validation
|
||||
and a streamlined developer experience for [Auth0](https://auth0.com/), [Firebase Auth](https://firebase.google.com/docs/auth/),
|
||||
and a streamlined developer experience for open source OpenID Connect provider
|
||||
[ORY Hydra](https://www.ory.sh), [Keycloak](https://www.keycloak.org),
|
||||
[Auth0](https://auth0.com/),
|
||||
[Firebase Auth](https://firebase.google.com/docs/auth/),
|
||||
[Google Auth](https://developers.google.com/identity/protocols/OpenIDConnect), and custom auth.
|
||||
|
||||
In both cases, Istio stores the authentication policies in the `Istio config store` via a custom Kubernetes API.
|
||||
|
|
|
|||
Loading…
Reference in New Issue