--- title: Authorization for HTTP traffic description: Shows how to set up access control for HTTP traffic. weight: 10 keywords: [security,access-control,rbac,authorization] aliases: - /docs/tasks/security/role-based-access-control.html - /docs/tasks/security/authz-http/ owner: istio/wg-security-maintainers test: yes --- This task shows you how to set up Istio authorization for HTTP traffic in an Istio mesh. Learn more in our [authorization concept page](/docs/concepts/security/#authorization). ## Before you begin The activities in this task assume that you: * Read the [authorization concept](/docs/concepts/security/#authorization). * Follow the [Istio installation guide](/docs/setup/install/istioctl/) to install Istio with mutual TLS enabled. * Deploy the [Bookinfo](/docs/examples/bookinfo/#deploying-the-application) sample application. After deploying the Bookinfo application, go to the Bookinfo product page at `http://$GATEWAY_URL/productpage`. On the product page, you can see the following sections: * **Book Details** on the lower left side, which includes: book type, number of pages, publisher, etc. * **Book Reviews** on the lower right of the page. When you refresh the page, the app shows different versions of reviews in the product page. The app presents the reviews in a round robin style: red stars, black stars, or no stars. {{< tip >}} If you don't see the expected output in the browser as you follow the task, retry in a few more seconds because some delay is possible due to caching and other propagation overhead. {{< /tip >}} {{< warning >}} This task requires mutual TLS enabled because the following examples use principal and namespace in the policies. {{< /warning >}} ## Configure access control for workloads using HTTP traffic Using Istio, you can easily setup access control for {{< gloss "workload" >}}workloads{{< /gloss >}} in your mesh. This task shows you how to set up access control using Istio authorization. First, you configure a simple `deny-all` policy that rejects all requests to the workload, and then grant more access to the workload gradually and incrementally. 1. Run the following command to create a `deny-all` policy in the `default` namespace. The policy doesn't have a `selector` field, which applies the policy to every workload in the `default` namespace. The `spec:` field of the policy has the empty value `{}`. That value means that no traffic is permitted, effectively denying all requests. {{< text bash >}} $ kubectl apply -f - <}} Point your browser at the Bookinfo `productpage` (`http://$GATEWAY_URL/productpage`). You should see `"RBAC: access denied"`. The error shows that the configured `deny-all` policy is working as intended, and Istio doesn't have any rules that allow any access to workloads in the mesh. 1. Run the following command to create a `productpage-viewer` policy to allow access with `GET` method to the `productpage` workload. The policy does not set the `from` field in the `rules` which means all sources are allowed, effectively allowing all users and workloads: {{< text bash >}} $ kubectl apply -f - <}} Point your browser at the Bookinfo `productpage` (`http://$GATEWAY_URL/productpage`). Now you should see the "Bookinfo Sample" page. However, you can see the following errors on the page: * `Error fetching product details` * `Error fetching product reviews` on the page. These errors are expected because we have not granted the `productpage` workload access to the `details` and `reviews` workloads. Next, you need to configure a policy to grant access to those workloads. 1. Run the following command to create the `details-viewer` policy to allow the `productpage` workload, which issues requests using the `cluster.local/ns/default/sa/bookinfo-productpage` service account, to access the `details` workload through `GET` methods: {{< text bash >}} $ kubectl apply -f - <}} 1. Run the following command to create a policy `reviews-viewer` to allow the `productpage` workload, which issues requests using the `cluster.local/ns/default/sa/bookinfo-productpage` service account, to access the `reviews` workload through `GET` methods: {{< text bash >}} $ kubectl apply -f - <}} Point your browser at the Bookinfo `productpage` (`http://$GATEWAY_URL/productpage`). Now, you should see the "Bookinfo Sample" page with "Book Details" on the lower left part, and "Book Reviews" on the lower right part. However, in the "Book Reviews" section, there is an error `Ratings service currently unavailable`. This is because the `reviews` workload doesn't have permission to access the `ratings` workload. To fix this issue, you need to grant the `reviews` workload access to the `ratings` workload. Next, we configure a policy to grant the `reviews` workload that access. 1. Run the following command to create the `ratings-viewer` policy to allow the `reviews` workload, which issues requests using the `cluster.local/ns/default/sa/bookinfo-reviews` service account, to access the `ratings` workload through `GET` methods: {{< text bash >}} $ kubectl apply -f - <}} Point your browser at the Bookinfo `productpage` (`http://$GATEWAY_URL/productpage`). You should see the "black" and "red" ratings in the "Book Reviews" section. **Congratulations!** You successfully applied authorization policy to enforce access control for workloads using HTTP traffic. ## Clean up 1. Remove all authorization policies from your configuration: {{< text bash >}} $ kubectl delete authorizationpolicy.security.istio.io/deny-all $ kubectl delete authorizationpolicy.security.istio.io/productpage-viewer $ kubectl delete authorizationpolicy.security.istio.io/details-viewer $ kubectl delete authorizationpolicy.security.istio.io/reviews-viewer $ kubectl delete authorizationpolicy.security.istio.io/ratings-viewer {{< /text >}}