diff --git a/.spelling b/.spelling index 1c34720df9..1476a5fb42 100644 --- a/.spelling +++ b/.spelling @@ -522,6 +522,8 @@ VirtualService sha256 deployment webhook +Keycloak +OpenID - search.md searchresults diff --git a/content/docs/concepts/security/index.md b/content/docs/concepts/security/index.md index 3a2af8f3d0..a0a950c991 100644 --- a/content/docs/concepts/security/index.md +++ b/content/docs/concepts/security/index.md @@ -224,7 +224,10 @@ Istio provides two types of authentication: - **Origin authentication**, also known as **end-user authentication**: verifies the original client making the request as an end-user or device. Istio enables request-level authentication with JSON Web Token (JWT) validation - and a streamlined developer experience for [Auth0](https://auth0.com/), [Firebase Auth](https://firebase.google.com/docs/auth/), + and a streamlined developer experience for open source OpenID Connect provider + [ORY Hydra](https://www.ory.sh), [Keycloak](https://www.keycloak.org), + [Auth0](https://auth0.com/), + [Firebase Auth](https://firebase.google.com/docs/auth/), [Google Auth](https://developers.google.com/identity/protocols/OpenIDConnect), and custom auth. In both cases, Istio stores the authentication policies in the `Istio config store` via a custom Kubernetes API.