mirror of https://github.com/istio/istio.io.git
544 lines
104 KiB
HTML
544 lines
104 KiB
HTML
<!doctype html><html lang=en itemscope itemtype=https://schema.org/WebPage><head><meta charset=utf-8><meta http-equiv=x-ua-compatible content="IE=edge"><meta name=viewport content="width=device-width,initial-scale=1,shrink-to-fit=no"><meta name=theme-color content="#466BB0"><meta name=title content="Security"><meta name=description content="Describes Istio's authorization and authentication functionality."><meta name=keywords content="microservices,services,mesh,security,policy,policies,authentication,authorization,rbac,access-control"><meta property="og:title" content="Security"><meta property="og:type" content="website"><meta property="og:description" content="Describes Istio's authorization and authentication functionality."><meta property="og:url" content="/v1.8/docs/concepts/security/"><meta property="og:image" content="/v1.8/img/istio-whitelogo-bluebackground-framed.svg"><meta property="og:image:alt" content="Istio Logo"><meta property="og:image:width" content="112"><meta property="og:image:height" content="150"><meta property="og:site_name" content="Istio"><meta name=twitter:card content="summary"><meta name=twitter:site content="@IstioMesh"><title>Istioldie 1.8 / Security</title><script async src="https://www.googletagmanager.com/gtag/js?id=UA-98480406-2"></script><script>window.dataLayer=window.dataLayer||[];function gtag(){dataLayer.push(arguments);}
|
||
gtag('js',new Date());gtag('config','UA-98480406-2');</script><link rel=alternate type=application/rss+xml title="Istio Blog" href=/v1.8/blog/feed.xml><link rel=alternate type=application/rss+xml title="Istio News" href=/v1.8/news/feed.xml><link rel=alternate type=application/rss+xml title="Istio Blog and News" href=/v1.8/feed.xml><link rel="shortcut icon" href=/v1.8/favicons/favicon.ico><link rel=apple-touch-icon href=/v1.8/favicons/apple-touch-icon-180x180.png sizes=180x180><link rel=icon type=image/png href=/v1.8/favicons/favicon-16x16.png sizes=16x16><link rel=icon type=image/png href=/v1.8/favicons/favicon-32x32.png sizes=32x32><link rel=icon type=image/png href=/v1.8/favicons/android-36x36.png sizes=36x36><link rel=icon type=image/png href=/v1.8/favicons/android-48x48.png sizes=48x48><link rel=icon type=image/png href=/v1.8/favicons/android-72x72.png sizes=72x72><link rel=icon type=image/png href=/v1.8/favicons/android-96x96.png sizes=96xW96><link rel=icon type=image/png href=/v1.8/favicons/android-144x144.png sizes=144x144><link rel=icon type=image/png href=/v1.8/favicons/android-192x192.png sizes=192x192><link rel=manifest href=/v1.8/manifest.json><meta name=apple-mobile-web-app-title content="Istio"><meta name=application-name content="Istio"><link rel=stylesheet href="https://fonts.googleapis.com/css?family=Work+Sans:400|Chivo:400|Work+Sans:500,300,600,300italic,400italic,500italic,600italic|Chivo:500,300,600,300italic,400italic,500italic,600italic"><link rel=stylesheet href=/v1.8/css/all.css><script src=/v1.8/js/themes_init.min.js></script></head><body class="language-unknown archive-site"><script>const branchName="release-1.8";const docTitle="Security";const iconFile="\/v1.8/img/icons.svg";const buttonCopy='Copy to clipboard';const buttonPrint='Print';const buttonDownload='Download';</script><script src="https://www.google.com/cse/brand?form=search-form" defer></script><script src=/v1.8/js/all.min.js data-manual defer></script><header><nav><a id=brand href=/v1.8/><span class=logo><svg viewBox="0 0 300 300"><circle cx="150" cy="150" r="146" stroke-width="2"/><polygon points="65 240 225 240 125 270"/><polygon points="65 230 125 220 125 110"/><polygon points="135 220 225 230 135 30"/></svg></span><span class=name>Istioldie 1.8</span></a><div id=hamburger><svg class="icon hamburger"><use xlink:href="/v1.8/img/icons.svg#hamburger"/></svg></div><div id=header-links><a class=current title="Learn how to deploy, use, and operate Istio." href=/v1.8/docs/>Docs</a>
|
||
<a title="Posts about using Istio." href=/v1.8/blog/2020/>Blog<i class=dot data-prefix=/blog></i></a>
|
||
<a title="Timely news about the Istio project." href=/v1.8/news/>News<i class=dot data-prefix=/news></i></a>
|
||
<a title="Frequently Asked Questions about Istio." href=/v1.8/faq/>FAQ</a>
|
||
<a title="Get a bit more in-depth info about the Istio project." href=/v1.8/about/>About</a><div class=menu><button id=gearDropdownButton class=menu-trigger title="Options and settings" aria-label="Options and Settings" aria-controls=gearDropdownContent><svg class="icon gear"><use xlink:href="/v1.8/img/icons.svg#gear"/></svg></button><div id=gearDropdownContent class=menu-content aria-labelledby=gearDropdownButton role=menu><a tabindex=-1 role=menuitem lang=en id=switch-lang-en class=active>English</a>
|
||
<a tabindex=-1 role=menuitem lang=zh id=switch-lang-zh>中文</a><div role=separator></div><a tabindex=-1 role=menuitem class=active id=light-theme-item>Light Theme</a>
|
||
<a tabindex=-1 role=menuitem id=dark-theme-item>Dark Theme</a><div role=separator></div><a tabindex=-1 role=menuitem id=syntax-coloring-item>Color Examples</a><div role=separator></div><h6>Other versions of this site</h6><a tabindex=-1 role=menuitem onclick="navigateToUrlOrRoot('https://istio.io/docs\/concepts\/security\/');return false;">Current Release</a>
|
||
<a tabindex=-1 role=menuitem onclick="navigateToUrlOrRoot('https://preliminary.istio.io/docs\/concepts\/security\/');return false;">Next Release</a>
|
||
<a tabindex=-1 role=menuitem href=https://istio.io/archive>Older Releases</a></div></div><button id=search-show title="Search this site" aria-label=Search><svg class="icon magnifier"><use xlink:href="/v1.8/img/icons.svg#magnifier"/></svg></button></div><form id=search-form name=cse role=search><input type=hidden name=cx value=002184991200833970123:iwwf17ikgf4>
|
||
<input type=hidden name=ie value=utf-8>
|
||
<input type=hidden name=hl value=en>
|
||
<input type=hidden id=search-page-url value=/v1.8/search>
|
||
<input id=search-textbox class=form-control name=q type=search aria-label="Search this site">
|
||
<button id=search-close title="Cancel search" type=reset aria-label="Cancel search"><svg class="icon cancel-x"><use xlink:href="/v1.8/img/icons.svg#cancel-x"/></svg></button></form></nav></header><div class=banner-container></div><main class=primary><div id=sidebar-container class="sidebar-container sidebar-offcanvas"><nav id=sidebar aria-label="Section Navigation"><div class=directory><div class=card><button class="header dynamic" id=card17 title="Learn about the different parts of the Istio system and the abstractions it uses." aria-controls=card17-body><svg class="icon concepts"><use xlink:href="/v1.8/img/icons.svg#concepts"/></svg>Concepts</button><div class="body default" aria-labelledby=card17 role=region id=card17-body><ul role=tree aria-expanded=true class=leaf-section aria-labelledby=card17><li role=none><a role=treeitem title="Introduces Istio, the problems it solves, its high-level architecture, and its design goals." href=/v1.8/docs/concepts/what-is-istio/>What is Istio?</a></li><li role=none><a role=treeitem title="Describes the various Istio features focused on traffic routing and control." href=/v1.8/docs/concepts/traffic-management/>Traffic Management</a></li><li role=none><span role=treeitem class=current title="Describes Istio's authorization and authentication functionality.">Security</span></li><li role=none><a role=treeitem title="Describes the telemetry and monitoring features provided by Istio." href=/v1.8/docs/concepts/observability/>Observability</a></li><li role=none><a role=treeitem title="Describes Istio's WebAssembly Plugin system." href=/v1.8/docs/concepts/wasm/>Extensibility</a></li></ul></div></div><div class=card><button class="header dynamic" id=card40 title="Instructions for installing the Istio control plane on Kubernetes." aria-controls=card40-body><svg class="icon setup"><use xlink:href="/v1.8/img/icons.svg#setup"/></svg>Setup</button><div class=body aria-labelledby=card40 role=region id=card40-body><ul role=tree aria-expanded=true aria-labelledby=card40><li role=none><a role=treeitem title="Try Istio’s features quickly and easily." href=/v1.8/docs/setup/getting-started/>Getting Started</a></li><li role=treeitem aria-label="Platform Setup"><button aria-hidden=true></button><a title="How to prepare various Kubernetes platforms before installing Istio." href=/v1.8/docs/setup/platform-setup/>Platform Setup</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Instructions to setup an Alibaba Cloud Kubernetes cluster for Istio." href=/v1.8/docs/setup/platform-setup/alicloud/>Alibaba Cloud</a></li><li role=none><a role=treeitem title="Instructions to setup an Azure cluster for Istio." href=/v1.8/docs/setup/platform-setup/azure/>Azure</a></li><li role=none><a role=treeitem title="Instructions to setup Docker Desktop for Istio." href=/v1.8/docs/setup/platform-setup/docker/>Docker Desktop</a></li><li role=none><a role=treeitem title="Instructions to setup a Google Kubernetes Engine cluster for Istio." href=/v1.8/docs/setup/platform-setup/gke/>Google Kubernetes Engine</a></li><li role=none><a role=treeitem title="Instructions to setup an IBM Cloud cluster for Istio." href=/v1.8/docs/setup/platform-setup/ibm/>IBM Cloud</a></li><li role=none><a role=treeitem title="Instructions to setup kind for Istio." href=/v1.8/docs/setup/platform-setup/kind/>kind</a></li><li role=none><a role=treeitem title="Instructions to setup Kops for use with Istio." href=/v1.8/docs/setup/platform-setup/kops/>Kops</a></li><li role=none><a role=treeitem title="Instructions to setup a Gardener cluster for Istio." href=/v1.8/docs/setup/platform-setup/gardener/>Kubernetes Gardener</a></li><li role=none><a role=treeitem title="Instructions to setup a KubeSphere Container Platform for Istio." href=/v1.8/docs/setup/platform-setup/kubesphere/>KubeSphere Container Platform</a></li><li role=none><a role=treeitem title="Instructions to setup MicroK8s for use with Istio." href=/v1.8/docs/setup/platform-setup/microk8s/>MicroK8s</a></li><li role=none><a role=treeitem title="Instructions to setup minikube for Istio." href=/v1.8/docs/setup/platform-setup/minikube/>Minikube</a></li><li role=none><a role=treeitem title="Instructions to setup an OpenShift cluster for Istio." href=/v1.8/docs/setup/platform-setup/openshift/>OpenShift</a></li><li role=none><a role=treeitem title="Instructions to setup an OKE cluster for Istio." href=/v1.8/docs/setup/platform-setup/oci/>Oracle Cloud Infrastructure</a></li></ul></li><li role=treeitem aria-label=Install><button aria-hidden=true></button><a title="Choose the guide that best suits your needs and platform." href=/v1.8/docs/setup/install/>Install</a><ul role=group aria-expanded=false><li role=none><a role=treeitem title="Install and customize any Istio configuration profile for in-depth evaluation or production use." href=/v1.8/docs/setup/install/istioctl/>Install with Istioctl</a></li><li role=none><a role=treeitem title="Instructions to install Istio in a Kubernetes cluster using the Istio operator." href=/v1.8/docs/setup/install/operator/>Istio Operator Install</a></li><li role=none><a role=treeitem title="Install and configure Istio for in-depth evaluation." href=/v1.8/docs/setup/install/helm/>Install with Helm</a></li><li role=treeitem aria-label="Install Multicluster"><button aria-hidden=true></button><a title="Install an Istio mesh across multiple Kubernetes clusters." href=/v1.8/docs/setup/install/multicluster/>Install Multicluster</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Initial steps before installing Istio on multiple clusters." href=/v1.8/docs/setup/install/multicluster/before-you-begin/>Before you begin</a></li><li role=none><a role=treeitem title="Install an Istio mesh across multiple primary clusters." href=/v1.8/docs/setup/install/multicluster/multi-primary/>Install Multi-Primary</a></li><li role=none><a role=treeitem title="Install an Istio mesh across primary and remote clusters." href=/v1.8/docs/setup/install/multicluster/primary-remote/>Install Primary-Remote</a></li><li role=none><a role=treeitem title="Install an Istio mesh across multiple primary clusters on different networks." href=/v1.8/docs/setup/install/multicluster/multi-primary_multi-network/>Install Multi-Primary on different networks</a></li><li role=none><a role=treeitem title="Install an Istio mesh across primary and remote clusters on different networks." href=/v1.8/docs/setup/install/multicluster/primary-remote_multi-network/>Install Primary-Remote on different networks</a></li><li role=none><a role=treeitem title="Verify that Istio has been installed properly on multiple clusters." href=/v1.8/docs/setup/install/multicluster/verify/>Verify the installation</a></li></ul></li><li role=none><a role=treeitem title="Deploy Istio and connect a workload running within a virtual machine to it." href=/v1.8/docs/setup/install/virtual-machine/>Virtual Machine Installation</a></li></ul></li><li role=treeitem aria-label=Upgrade><button aria-hidden=true></button><a title="Upgrade, downgrade, and manage Istio accross multiple control plane revisions." href=/v1.8/docs/setup/upgrade/>Upgrade</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Upgrade Istio by first running a canary deployment of a new control plane." href=/v1.8/docs/setup/upgrade/canary/>Canary Upgrades</a></li><li role=none><a role=treeitem title="Upgrade or downgrade Istio in place." href=/v1.8/docs/setup/upgrade/in-place/>In-place Upgrades</a></li><li role=none><a role=treeitem title="Configuring and upgrading Istio with gateways." href=/v1.8/docs/setup/upgrade/gateways/>Managing Gateways with Multiple Revisions [experimental]</a></li></ul></li><li role=treeitem aria-label="More Guides"><button aria-hidden=true></button><a title="More information on additional setup tasks." href=/v1.8/docs/setup/additional-setup/>More Guides</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Describes the built-in Istio installation configuration profiles." href=/v1.8/docs/setup/additional-setup/config-profiles/>Installation Configuration Profiles</a></li><li role=none><a role=treeitem title="Install the Istio sidecar in application pods automatically using the sidecar injector webhook or manually using istioctl CLI." href=/v1.8/docs/setup/additional-setup/sidecar-injection/>Installing the Sidecar</a></li><li role=none><a role=treeitem title="Install and use Istio with the Istio CNI plugin, allowing operators to deploy services with lower privilege." href=/v1.8/docs/setup/additional-setup/cni/>Install Istio with the Istio CNI plugin</a></li><li role=none><a role=treeitem title="Install an external control plane and remote cluster." href=/v1.8/docs/setup/additional-setup/external-controlplane/>Install Istio with an External Control Plane</a></li></ul></li></ul></div></div><div class=card><button class="header dynamic" id=card73 title="How to do single specific targeted activities with the Istio system." aria-controls=card73-body><svg class="icon tasks"><use xlink:href="/v1.8/img/icons.svg#tasks"/></svg>Tasks</button><div class=body aria-labelledby=card73 role=region id=card73-body><ul role=tree aria-expanded=true aria-labelledby=card73><li role=treeitem aria-label="Traffic Management"><button aria-hidden=true></button><a title="Tasks that demonstrate Istio's traffic routing features." href=/v1.8/docs/tasks/traffic-management/>Traffic Management</a><ul role=group aria-expanded=false><li role=none><a role=treeitem title="This task shows you how to configure dynamic request routing to multiple versions of a microservice." href=/v1.8/docs/tasks/traffic-management/request-routing/>Request Routing</a></li><li role=none><a role=treeitem title="This task shows you how to inject faults to test the resiliency of your application." href=/v1.8/docs/tasks/traffic-management/fault-injection/>Fault Injection</a></li><li role=none><a role=treeitem title="Shows you how to migrate traffic from an old to new version of a service." href=/v1.8/docs/tasks/traffic-management/traffic-shifting/>Traffic Shifting</a></li><li role=none><a role=treeitem title="Shows you how to migrate TCP traffic from an old to new version of a TCP service." href=/v1.8/docs/tasks/traffic-management/tcp-traffic-shifting/>TCP Traffic Shifting</a></li><li role=none><a role=treeitem title="This task shows you how to setup request timeouts in Envoy using Istio." href=/v1.8/docs/tasks/traffic-management/request-timeouts/>Request Timeouts</a></li><li role=none><a role=treeitem title="This task shows you how to configure circuit breaking for connections, requests, and outlier detection." href=/v1.8/docs/tasks/traffic-management/circuit-breaking/>Circuit Breaking</a></li><li role=none><a role=treeitem title="This task demonstrates the traffic mirroring/shadowing capabilities of Istio." href=/v1.8/docs/tasks/traffic-management/mirroring/>Mirroring</a></li><li role=treeitem aria-label=Ingress><button aria-hidden=true></button><a title="Controlling ingress traffic for an Istio service mesh." href=/v1.8/docs/tasks/traffic-management/ingress/>Ingress</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Describes how to configure an Istio gateway to expose a service outside of the service mesh." href=/v1.8/docs/tasks/traffic-management/ingress/ingress-control/>Ingress Gateways</a></li><li role=none><a role=treeitem title="Expose a service outside of the service mesh over TLS or mTLS." href=/v1.8/docs/tasks/traffic-management/ingress/secure-ingress/>Secure Gateways</a></li><li role=none><a role=treeitem title="Describes how to configure SNI passthrough for an ingress gateway." href=/v1.8/docs/tasks/traffic-management/ingress/ingress-sni-passthrough/>Ingress Gateway without TLS Termination</a></li><li role=none><a role=treeitem title="Describes how to configure a Kubernetes Ingress object to expose a service outside of the service mesh." href=/v1.8/docs/tasks/traffic-management/ingress/kubernetes-ingress/>Kubernetes Ingress</a></li><li role=none><a role=treeitem title="Describes how to configure the Kubernetes Service APIs with Istio." href=/v1.8/docs/tasks/traffic-management/ingress/service-apis/>Kubernetes Service APIs [Experimental]</a></li></ul></li><li role=treeitem aria-label=Egress><button aria-hidden=true></button><a title="Controlling egress traffic for an Istio service mesh." href=/v1.8/docs/tasks/traffic-management/egress/>Egress</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Describes how to configure Istio to route traffic from services in the mesh to external services." href=/v1.8/docs/tasks/traffic-management/egress/egress-control/>Accessing External Services</a></li><li role=none><a role=treeitem title="Describes how to configure Istio to perform TLS origination for traffic to external services." href=/v1.8/docs/tasks/traffic-management/egress/egress-tls-origination/>Egress TLS Origination</a></li><li role=none><a role=treeitem title="Describes how to configure Istio to direct traffic to external services through a dedicated gateway." href=/v1.8/docs/tasks/traffic-management/egress/egress-gateway/>Egress Gateways</a></li><li role=none><a role=treeitem title="Describes how to configure an Egress Gateway to perform TLS origination to external services using Secret Discovery Service." href=/v1.8/docs/tasks/traffic-management/egress/egress-gateway-tls-origination-sds/>Egress Gateways with TLS Origination (SDS)</a></li><li role=none><a role=treeitem title="Describes how to configure an Egress Gateway to perform TLS origination to external services using file mount certificates." href=/v1.8/docs/tasks/traffic-management/egress/egress-gateway-tls-origination/>Egress Gateways with TLS Origination (File Mount)</a></li><li role=none><a role=treeitem title="Describes how to enable egress traffic for a set of hosts in a common domain, instead of configuring each and every host separately." href=/v1.8/docs/tasks/traffic-management/egress/wildcard-egress-hosts/>Egress using Wildcard Hosts</a></li><li role=none><a role=treeitem title="Shows how to configure Istio for Kubernetes External Services." href=/v1.8/docs/tasks/traffic-management/egress/egress-kubernetes-services/>Kubernetes Services for Egress Traffic</a></li><li role=none><a role=treeitem title="Describes how to configure Istio to let applications use an external HTTPS proxy." href=/v1.8/docs/tasks/traffic-management/egress/http-proxy/>Using an External HTTPS Proxy</a></li></ul></li></ul></li><li role=treeitem aria-label=Security><button aria-hidden=true></button><a title="Demonstrates how to secure the mesh." href=/v1.8/docs/tasks/security/>Security</a><ul role=group aria-expanded=false><li role=treeitem aria-label="Certificate Management"><button aria-hidden=true></button><a title="Management of the certificates in Istio." href=/v1.8/docs/tasks/security/cert-management/>Certificate Management</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Shows how system administrators can configure Istio's CA with a root certificate, signing certificate and key." href=/v1.8/docs/tasks/security/cert-management/plugin-ca-cert/>Plug in CA Certificates</a></li><li role=none><a role=treeitem title="Shows how to provision and manage DNS certificates in Istio." href=/v1.8/docs/tasks/security/cert-management/dns-cert/>Istio DNS Certificate Management</a></li><li role=none><a role=treeitem title="Shows how to use a Custom Certificate Authority (that integrates with the Kubernetes CSR API) to provision Istio workload certificates." href=/v1.8/docs/tasks/security/cert-management/custom-ca-k8s/>Custom CA Integration using Kubernetes CSR [experimental]</a></li></ul></li><li role=treeitem aria-label=Authentication><button aria-hidden=true></button><a title="Controlling mutual TLS and end-user authentication for mesh services." href=/v1.8/docs/tasks/security/authentication/>Authentication</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Shows you how to use Istio authentication policy to setup mutual TLS and basic end-user authentication." href=/v1.8/docs/tasks/security/authentication/authn-policy/>Authentication Policy</a></li><li role=none><a role=treeitem title="Shows you how to incrementally migrate your Istio services to mutual TLS." href=/v1.8/docs/tasks/security/authentication/mtls-migration/>Mutual TLS Migration</a></li></ul></li><li role=treeitem aria-label=Authorization><button aria-hidden=true></button><a title="Shows how to control access to Istio services." href=/v1.8/docs/tasks/security/authorization/>Authorization</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Shows how to set up access control for HTTP traffic." href=/v1.8/docs/tasks/security/authorization/authz-http/>Authorization for HTTP traffic</a></li><li role=none><a role=treeitem title="How to set up access control for TCP traffic." href=/v1.8/docs/tasks/security/authorization/authz-tcp/>Authorization for TCP traffic</a></li><li role=none><a role=treeitem title="How to set up access control with JWT in Istio." href=/v1.8/docs/tasks/security/authorization/authz-jwt/>Authorization with JWT</a></li><li role=none><a role=treeitem title="Shows how to set up access control to deny traffic explicitly." href=/v1.8/docs/tasks/security/authorization/authz-deny/>Authorization policies with a deny action</a></li><li role=none><a role=treeitem title="How to set up access control on an ingress gateway." href=/v1.8/docs/tasks/security/authorization/authz-ingress/>Authorization on Ingress Gateway</a></li><li role=none><a role=treeitem title="Shows how to migrate from one trust domain to another without changing authorization policy." href=/v1.8/docs/tasks/security/authorization/authz-td-migration/>Authorization Policy Trust Domain Migration</a></li></ul></li></ul></li><li role=treeitem aria-label=Observability><button aria-hidden=true></button><a title="Demonstrates how to collect telemetry information from the mesh." href=/v1.8/docs/tasks/observability/>Observability</a><ul role=group aria-expanded=false><li role=treeitem aria-label=Metrics><button aria-hidden=true></button><a title="Demonstrates the collection and querying of metrics within Istio." href=/v1.8/docs/tasks/observability/metrics/>Metrics</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="This task shows you how to configure Istio to collect metrics for TCP services." href=/v1.8/docs/tasks/observability/metrics/tcp-metrics/>Collecting Metrics for TCP Services</a></li><li role=none><a role=treeitem title="This task shows you how to customize the Istio metrics." href=/v1.8/docs/tasks/observability/metrics/customize-metrics/>Customizing Istio Metrics</a></li><li role=none><a role=treeitem title="This task shows you how to improve telemetry by grouping requests and responses by their type." href=/v1.8/docs/tasks/observability/metrics/classify-metrics/>Classifying Metrics Based on Request or Response (Experimental)</a></li><li role=none><a role=treeitem title="This task shows you how to query for Istio Metrics using Prometheus." href=/v1.8/docs/tasks/observability/metrics/querying-metrics/>Querying Metrics from Prometheus</a></li><li role=none><a role=treeitem title="This task shows you how to setup and use the Istio Dashboard to monitor mesh traffic." href=/v1.8/docs/tasks/observability/metrics/using-istio-dashboard/>Visualizing Metrics with Grafana</a></li></ul></li><li role=treeitem aria-label=Logs><button aria-hidden=true></button><a title="Demonstrates the collection of logs within Istio." href=/v1.8/docs/tasks/observability/logs/>Logs</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="This task shows you how to configure Envoy proxies to print access logs to their standard output." href=/v1.8/docs/tasks/observability/logs/access-log/>Getting Envoy's Access Logs</a></li></ul></li><li role=treeitem aria-label="Distributed Tracing"><button aria-hidden=true></button><a title="This task shows you how to configure Istio-enabled applications to collect trace spans." href=/v1.8/docs/tasks/observability/distributed-tracing/>Distributed Tracing</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Overview of distributed tracing in Istio." href=/v1.8/docs/tasks/observability/distributed-tracing/overview/>Overview</a></li><li role=none><a role=treeitem title="Learn how to configure the proxies to send tracing requests to Zipkin." href=/v1.8/docs/tasks/observability/distributed-tracing/zipkin/>Zipkin</a></li><li role=none><a role=treeitem title="Learn how to configure the proxies to send tracing requests to Jaeger." href=/v1.8/docs/tasks/observability/distributed-tracing/jaeger/>Jaeger</a></li><li role=none><a role=treeitem title="How to configure the proxies to send tracing requests to Lightstep." href=/v1.8/docs/tasks/observability/distributed-tracing/lightstep/>Lightstep</a></li><li role=none><a role=treeitem title="How to configure tracing options (beta/development)." href=/v1.8/docs/tasks/observability/distributed-tracing/configurability/>Configurability (Beta/Development)</a></li></ul></li><li role=none><a role=treeitem title="This task shows you how to visualize your services within an Istio mesh." href=/v1.8/docs/tasks/observability/kiali/>Visualizing Your Mesh</a></li><li role=none><a role=treeitem title="This task shows you how to configure external access to the set of Istio telemetry addons." href=/v1.8/docs/tasks/observability/gateways/>Remotely Accessing Telemetry Addons</a></li></ul></li></ul></div></div><div class=card><button class="header dynamic" id=card94 title="A variety of fully working example uses for Istio that you can experiment with." aria-controls=card94-body><svg class="icon examples"><use xlink:href="/v1.8/img/icons.svg#examples"/></svg>Examples</button><div class=body aria-labelledby=card94 role=region id=card94-body><ul role=tree aria-expanded=true aria-labelledby=card94><li role=none><a role=treeitem title="Deploys a sample application composed of four separate microservices used to demonstrate various Istio features." href=/v1.8/docs/examples/bookinfo/>Bookinfo Application</a></li><li role=treeitem aria-label="Virtual Machines"><button aria-hidden=true></button><a title="Examples that add workloads running on virtual machines to an Istio mesh." href=/v1.8/docs/examples/virtual-machines/>Virtual Machines</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Learn how to add a service running on a virtual machine to your single-network Istio mesh." href=/v1.8/docs/examples/virtual-machines/single-network/>Example Application using Virtual Machines in a Single Network Mesh</a></li><li role=none><a role=treeitem title="Learn how to add a service running on a virtual machine to your multi-network Istio mesh." href=/v1.8/docs/examples/virtual-machines/multi-network/>Virtual Machines in Multi-Network Meshes</a></li><li role=none><a role=treeitem title="Run the Bookinfo application with a MySQL service running on a virtual machine within your mesh." href=/v1.8/docs/examples/virtual-machines/bookinfo/>Bookinfo with a Virtual Machine</a></li></ul></li><li role=treeitem aria-label="Learn Microservices using Kubernetes and Istio"><button aria-hidden=true></button><a title="This modular tutorial provides new users with hands-on experience using Istio for common microservices scenarios, one step at a time." href=/v1.8/docs/examples/microservices-istio/>Learn Microservices using Kubernetes and Istio</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/prereq/>Prerequisites</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/setup-kubernetes-cluster/>Setup a Kubernetes Cluster</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/setup-local-computer/>Setup a Local Computer</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/single/>Run a Microservice Locally</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/package-service/>Run ratings in Docker</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/bookinfo-kubernetes/>Run Bookinfo with Kubernetes</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/production-testing/>Test in production</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/add-new-microservice-version/>Add a new version of reviews</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/add-istio/>Enable Istio on productpage</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/enable-istio-all-microservices/>Enable Istio on all the microservices</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/istio-ingress-gateway/>Configure Istio Ingress Gateway</a></li><li role=none><a role=treeitem href=/v1.8/docs/examples/microservices-istio/logs-istio/>Monitoring with Istio</a></li></ul></li></ul></div></div><div class=card><button class="header dynamic" id=card118 title="Concepts, tools, and techniques to deploy and manage an Istio mesh." aria-controls=card118-body><svg class="icon guide"><use xlink:href="/v1.8/img/icons.svg#guide"/></svg>Operations</button><div class=body aria-labelledby=card118 role=region id=card118-body><ul role=tree aria-expanded=true aria-labelledby=card118><li role=treeitem aria-label=Deployment><button aria-hidden=true></button><a title="Requirements, concepts, and considerations for setting up an Istio deployment." href=/v1.8/docs/ops/deployment/>Deployment</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Describes Istio's high-level architecture and design goals." href=/v1.8/docs/ops/deployment/architecture/>Architecture</a></li><li role=none><a role=treeitem title="Describes the options and considerations when configuring your Istio deployment." href=/v1.8/docs/ops/deployment/deployment-models/>Deployment Models</a></li><li role=none><a role=treeitem title="Istio performance and scalability summary." href=/v1.8/docs/ops/deployment/performance-and-scalability/>Performance and Scalability</a></li><li role=none><a role=treeitem title="Requirements of applications deployed in an Istio-enabled cluster." href=/v1.8/docs/ops/deployment/requirements/>Application Requirements</a></li></ul></li><li role=treeitem aria-label=Configuration><button aria-hidden=true></button><a title="Advanced concepts and features for configuring a running Istio mesh." href=/v1.8/docs/ops/configuration/>Configuration</a><ul role=group aria-expanded=false><li role=treeitem aria-label="Mesh Configuration"><button aria-hidden=true></button><a title="Helps you manage the global mesh configuration." href=/v1.8/docs/ops/configuration/mesh/>Mesh Configuration</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Provides a general overview of Istio's use of Kubernetes webhooks and the related issues that can arise." href=/v1.8/docs/ops/configuration/mesh/webhook/>Dynamic Admission Webhooks Overview</a></li><li role=none><a role=treeitem title="Describes how to wait to apply mesh configuration until a resource reaches a given status or readiness." href=/v1.8/docs/ops/configuration/mesh/config-resource-ready/>Wait for Resource Status to Apply Configuration</a></li><li role=none><a role=treeitem title="Describes Istio's use of Kubernetes webhooks for automatic sidecar injection." href=/v1.8/docs/ops/configuration/mesh/injection-concepts/>Automatic Sidecar Injection</a></li><li role=none><a role=treeitem title="Shows how to do health checking for Istio services." href=/v1.8/docs/ops/configuration/mesh/app-health-check/>Health Checking of Istio Services</a></li></ul></li><li role=treeitem aria-label="Traffic Management"><button aria-hidden=true></button><a title="Helps you manage the networking aspects of a running mesh." href=/v1.8/docs/ops/configuration/traffic-management/>Traffic Management</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Information on how to specify protocols." href=/v1.8/docs/ops/configuration/traffic-management/protocol-selection/>Protocol Selection</a></li><li role=none><a role=treeitem title="Information on how to enable and understand Locality Load Balancing." href=/v1.8/docs/ops/configuration/traffic-management/locality-load-balancing/>Locality Load Balancing</a></li><li role=none><a role=treeitem title="How to configure TLS settings to secure network traffic." href=/v1.8/docs/ops/configuration/traffic-management/tls-configuration/>TLS Configuration</a></li><li role=none><a role=treeitem title="How to configure gateway network topology." href=/v1.8/docs/ops/configuration/traffic-management/network-topologies/>Configuring Gateway Network Topology [experimental]</a></li></ul></li><li role=treeitem aria-label=Security><button aria-hidden=true></button><a title="Helps you manage the security aspects of a running mesh." href=/v1.8/docs/ops/configuration/security/>Security</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Use hardened container images to reduce Istio's attack surface." href=/v1.8/docs/ops/configuration/security/harden-docker-images/>Harden Docker Container Images</a></li><li role=none><a role=treeitem title="Learn how to extend the lifetime of the Istio self-signed root certificate." href=/v1.8/docs/ops/configuration/security/root-transition/>Extending Self-Signed Certificate Lifetime</a></li></ul></li><li role=treeitem aria-label=Observability><button aria-hidden=true></button><a title="Helps you manage telemetry collection and visualization in a running mesh." href=/v1.8/docs/ops/configuration/telemetry/>Observability</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Fine-grained control of Envoy statistics." href=/v1.8/docs/ops/configuration/telemetry/envoy-stats/>Envoy Statistics</a></li><li role=none><a role=treeitem title="Configure Prometheus to monitor multicluster Istio." href=/v1.8/docs/ops/configuration/telemetry/monitoring-multicluster-prometheus/>Monitoring Multicluster Istio with Prometheus</a></li></ul></li></ul></li><li role=treeitem aria-label="Best Practices"><button aria-hidden=true></button><a title="Best practices for setting up and managing an Istio service mesh." href=/v1.8/docs/ops/best-practices/>Best Practices</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="General best practices when setting up an Istio service mesh." href=/v1.8/docs/ops/best-practices/deployment/>Deployment Best Practices</a></li><li role=none><a role=treeitem title="Configuration best practices to avoid networking or traffic management issues." href=/v1.8/docs/ops/best-practices/traffic-management/>Traffic Management Best Practices</a></li><li role=none><a role=treeitem title="Best practices for securing applications using Istio." href=/v1.8/docs/ops/best-practices/security/>Security Best Practices</a></li><li role=none><a role=treeitem title="Best practices for observing applications using Istio." href=/v1.8/docs/ops/best-practices/observability/>Observability Best Practices</a></li></ul></li><li role=treeitem aria-label="Common Problems"><button aria-hidden=true></button><a title="Describes how to identify and resolve common problems in Istio." href=/v1.8/docs/ops/common-problems/>Common Problems</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Techniques to address common Istio traffic management and network problems." href=/v1.8/docs/ops/common-problems/network-issues/>Traffic Management Problems</a></li><li role=none><a role=treeitem title="Techniques to address common Istio authentication, authorization, and general security-related problems." href=/v1.8/docs/ops/common-problems/security-issues/>Security Problems</a></li><li role=none><a role=treeitem title="Dealing with telemetry collection issues." href=/v1.8/docs/ops/common-problems/observability-issues/>Observability Problems</a></li><li role=none><a role=treeitem title="Resolve common problems with Istio's use of Kubernetes webhooks for automatic sidecar injection." href=/v1.8/docs/ops/common-problems/injection/>Sidecar Injection Problems</a></li><li role=none><a role=treeitem title="Describes how to resolve configuration validation problems." href=/v1.8/docs/ops/common-problems/validation/>Configuration Validation Problems</a></li></ul></li><li role=treeitem aria-label="Diagnostic Tools"><button aria-hidden=true></button><a title="Tools and techniques to help troubleshoot an Istio mesh." href=/v1.8/docs/ops/diagnostic-tools/>Diagnostic Tools</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Istio includes a supplemental tool that provides debugging and diagnosis for Istio service mesh deployments." href=/v1.8/docs/ops/diagnostic-tools/istioctl/>Using the Istioctl Command-line Tool</a></li><li role=none><a role=treeitem title="Describes tools and techniques to diagnose Envoy configuration issues related to traffic management." href=/v1.8/docs/ops/diagnostic-tools/proxy-cmd/>Debugging Envoy and Istiod</a></li><li role=none><a role=treeitem title="Shows you how to use istioctl describe to verify the configurations of a pod in your mesh." href=/v1.8/docs/ops/diagnostic-tools/istioctl-describe/>Understand your Mesh with Istioctl Describe</a></li><li role=none><a role=treeitem title="Shows you how to use istioctl analyze to identify potential issues with your configuration." href=/v1.8/docs/ops/diagnostic-tools/istioctl-analyze/>Diagnose your Configuration with Istioctl Analyze</a></li><li role=none><a role=treeitem title="Describes how to use ControlZ to get insight into a running istiod component." href=/v1.8/docs/ops/diagnostic-tools/controlz/>Istiod Introspection</a></li><li role=none><a role=treeitem title="Describes how to use component-level logging to get insights into a running component's behavior." href=/v1.8/docs/ops/diagnostic-tools/component-logging/>Component Logging</a></li></ul></li><li role=treeitem aria-label=Integrations><button aria-hidden=true></button><a title="Other softwares that Istio can integrate with to provide additional functionality." href=/v1.8/docs/ops/integrations/>Integrations</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Information on how to integrate with cert-manager." href=/v1.8/docs/ops/integrations/certmanager/>cert-manager</a></li><li role=none><a role=treeitem title="Information on how to integrate with Grafana to set up Istio dashboards." href=/v1.8/docs/ops/integrations/grafana/>Grafana</a></li><li role=none><a role=treeitem title="How to integrate with Jaeger." href=/v1.8/docs/ops/integrations/jaeger/>Jaeger</a></li><li role=none><a role=treeitem title="Information on how to integrate with Kiali." href=/v1.8/docs/ops/integrations/kiali/>Kiali</a></li><li role=none><a role=treeitem title="How to integrate with Prometheus." href=/v1.8/docs/ops/integrations/prometheus/>Prometheus</a></li><li role=none><a role=treeitem title="How to integrate with Zipkin." href=/v1.8/docs/ops/integrations/zipkin/>Zipkin</a></li></ul></li></ul></div></div><div class=card><button class="header dynamic" id=card169 title="Detailed authoritative reference material such as command-line options, configuration options, and API calling parameters." aria-controls=card169-body><svg class="icon reference"><use xlink:href="/v1.8/img/icons.svg#reference"/></svg>Reference</button><div class=body aria-labelledby=card169 role=region id=card169-body><ul role=tree aria-expanded=true aria-labelledby=card169><li role=treeitem aria-label=Configuration><button aria-hidden=true></button><a title="Detailed information on configuration options." href=/v1.8/docs/reference/config/>Configuration</a><ul role=group aria-expanded=false><li role=none><a role=treeitem title="Configuration affecting Istio control plane installation version and shape." href=/v1.8/docs/reference/config/istio.operator.v1alpha1/>IstioOperator Options</a></li><li role=none><a role=treeitem title="Configuration affecting the service mesh as a whole." href=/v1.8/docs/reference/config/istio.mesh.v1alpha1/>Global Mesh Options</a></li><li role=none><a role=treeitem title="Describes the structure of messages generated by Istio analyzers." href=/v1.8/docs/reference/config/istio.analysis.v1alpha1/>Analysis Messages</a></li><li role=none><a role=treeitem title="Describes the role of the `status` field in configuration workflow." href=/v1.8/docs/reference/config/config-status/>Configuration Status Field</a></li><li role=treeitem aria-label="Proxy Extensions"><button aria-hidden=true></button><a title="Describes how to configure Istio proxy extensions." href=/v1.8/docs/reference/config/proxy_extensions/>Proxy Extensions</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Configuration for Metadata Exchange Filter." href=/v1.8/docs/reference/config/proxy_extensions/metadata_exchange/>Metadata Exchange Config</a></li><li role=none><a role=treeitem title="Configuration for Stackdriver filter." href=/v1.8/docs/reference/config/proxy_extensions/stackdriver/>Stackdriver Config</a></li><li role=none><a role=treeitem title="Configuration for Attribute Generation plugin." href=/v1.8/docs/reference/config/proxy_extensions/attributegen/>AttributeGen Config</a></li><li role=none><a role=treeitem title="Configuration for AccessLogPolicy Filter." href=/v1.8/docs/reference/config/proxy_extensions/accesslogpolicy/>AccessLogPolicy Config</a></li><li role=none><a role=treeitem title="Configuration for Stats Filter." href=/v1.8/docs/reference/config/proxy_extensions/stats/>Stats Config</a></li><li role=none><a role=treeitem title="How to enable telemetry generation with the Wasm runtime (experimental)." href=/v1.8/docs/reference/config/proxy_extensions/wasm_telemetry/>Wasm-based Telemetry (Experimental)</a></li></ul></li><li role=treeitem aria-label="Traffic Management"><button aria-hidden=true></button><a title="Describes how to configure HTTP/TCP routing features." href=/v1.8/docs/reference/config/networking/>Traffic Management</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Configuration affecting load balancing, outlier detection, etc." href=/v1.8/docs/reference/config/networking/destination-rule/>Destination Rule</a></li><li role=none><a role=treeitem title="Customizing Envoy configuration generated by Istio." href=/v1.8/docs/reference/config/networking/envoy-filter/>Envoy Filter</a></li><li role=none><a role=treeitem title="Configuration affecting edge load balancer." href=/v1.8/docs/reference/config/networking/gateway/>Gateway</a></li><li role=none><a role=treeitem title="Configuration affecting service registry." href=/v1.8/docs/reference/config/networking/service-entry/>Service Entry</a></li><li role=none><a role=treeitem title="Configuration affecting network reachability of a sidecar." href=/v1.8/docs/reference/config/networking/sidecar/>Sidecar</a></li><li role=none><a role=treeitem title="Describes a collection of workload instances." href=/v1.8/docs/reference/config/networking/workload-group/>Workload Group</a></li><li role=none><a role=treeitem title="Configuration affecting VMs onboarded into the mesh." href=/v1.8/docs/reference/config/networking/workload-entry/>Workload Entry</a></li><li role=none><a role=treeitem title="Configuration affecting label/content routing, sni routing, etc." href=/v1.8/docs/reference/config/networking/virtual-service/>Virtual Service</a></li></ul></li><li role=treeitem aria-label=Security><button aria-hidden=true></button><a title="Describes how to configure Istio's security features." href=/v1.8/docs/reference/config/security/>Security</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Configuration to validate JWT." href=/v1.8/docs/reference/config/security/jwt/>JWTRule</a></li><li role=none><a role=treeitem title="Peer authentication configuration for workloads." href=/v1.8/docs/reference/config/security/peer_authentication/>PeerAuthentication</a></li><li role=none><a role=treeitem title="Request authentication configuration for workloads." href=/v1.8/docs/reference/config/security/request_authentication/>RequestAuthentication</a></li><li role=none><a role=treeitem title="Configuration for access control on workloads." href=/v1.8/docs/reference/config/security/authorization-policy/>Authorization Policy</a></li><li role=none><a role=treeitem title="Describes the supported conditions in authorization policies." href=/v1.8/docs/reference/config/security/conditions/>Authorization Policy Conditions</a></li></ul></li><li role=treeitem aria-label="Common Types"><button aria-hidden=true></button><a title="Describes common types in Istio API." href=/v1.8/docs/reference/config/type/>Common Types</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Definition of a workload selector." href=/v1.8/docs/reference/config/type/workload-selector/>Workload Selector</a></li></ul></li><li role=none><a role=treeitem title="Istio standard metrics exported by Istio telemetry." href=/v1.8/docs/reference/config/metrics/>Istio Standard Metrics</a></li><li role=none><a role=treeitem title="Resource annotations used by Istio." href=/v1.8/docs/reference/config/annotations/>Resource Annotations</a></li><li role=treeitem aria-label="Configuration Analysis Messages"><button aria-hidden=true></button><a title="Documents the individual error and warning messages produced during configuration analysis." href=/v1.8/docs/reference/config/analysis/>Configuration Analysis Messages</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0113/>MTLSPolicyConflict</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0109/>ConflictingMeshGatewayVirtualServiceHosts</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0110/>ConflictingSidecarWorkloadSelectors</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0116/>DeploymentAssociatedToMultipleServices</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0117/>DeploymentRequiresServiceAssociated</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0002/>Deprecated</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0104/>GatewayPortNotOnWorkload</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0001/>InternalError</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0125/>InvalidAnnotation</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0122/>InvalidRegexp</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0105/>IstioProxyImageMismatch</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0119/>JwtFailureDueToInvalidServicePortPrefix</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0107/>MisplacedAnnotation</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0108/>UnknownAnnotation</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0111/>MultipleSidecarsWithoutWorkloadSelectors</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0123/>NamespaceMultipleInjectionLabels</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0102/>NamespaceNotInjected</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0127/>NoMatchingWorkloadsFound</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0128/>NoServerCertificateVerificationDestinationLevel</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0129/>NoServerCertificateVerificationPortLevel</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/message-format/>Analyzer Message Format</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0131/>VirtualServiceIneffectiveMatch</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0118/>PortNameIsNotUnderNamingConvention</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0101/>ReferencedResourceNotFound</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0106/>SchemaValidationError</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0130/>VirtualServiceUnreachableRule</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0103/>PodMissingProxy</a></li><li role=none><a role=treeitem href=/v1.8/docs/reference/config/analysis/ist0112/>VirtualServiceDestinationPortSelectorRequired</a></li></ul></li></ul></li><li role=treeitem aria-label=Commands><button aria-hidden=true></button><a title="Describes usage and options of the Istio commands and utilities." href=/v1.8/docs/reference/commands/>Commands</a><ul role=group aria-expanded=false class=leaf-section><li role=none><a role=treeitem title="Istio control interface." href=/v1.8/docs/reference/commands/istioctl/>istioctl</a></li><li role=none><a role=treeitem title="Istio Pilot." href=/v1.8/docs/reference/commands/pilot-discovery/>pilot-discovery</a></li><li role=none><a role=treeitem title="The Istio operator." href=/v1.8/docs/reference/commands/operator/>operator</a></li><li role=none><a role=treeitem title="Istio Pilot agent." href=/v1.8/docs/reference/commands/pilot-agent/>pilot-agent</a></li></ul></li><li role=none><a role=treeitem title="A glossary of common Istio terms." href=/v1.8/docs/reference/glossary/>Glossary</a></li></ul></div></div></div></nav></div><div class=article-container><button tabindex=-1 id=sidebar-toggler title="Toggle the navigation bar"><svg class="icon pull"><use xlink:href="/v1.8/img/icons.svg#pull"/></svg></button><nav aria-label=Breadcrumb><ol><li><a href=/v1.8/ title="Connect, secure, control, and observe services.">Istio</a></li><li><a href=/v1.8/docs/ title="Learn how to deploy, use, and operate Istio.">Docs</a></li><li><a href=/v1.8/docs/concepts/ title="Learn about the different parts of the Istio system and the abstractions it uses.">Concepts</a></li><li>Security</li></ol></nav><article aria-labelledby=title><div class=title-area><div style=width:100%><h1 id=title>Security</h1><p class=byline><span title="4352 words"><svg class="icon clock"><use xlink:href="/v1.8/img/icons.svg#clock"/></svg><span> </span>21 minute read</span>
|
||
<span> </span>
|
||
<span><a href=https://github.com/istio/istio.io/tree/master/README.md#testing-document-content title="No automated test is available for this page. Click for details or to help create one."><svg class="icon cancel-grey"><use xlink:href="/v1.8/img/icons.svg#cancel-grey"/></svg><span> </span>
|
||
page test</a></span></p></div></div><nav class=toc-inlined aria-label="Table of Contents"><div><hr><ol><li role=none aria-label="High-level architecture"><a href=#high-level-architecture>High-level architecture</a><li role=none aria-label="Istio identity"><a href=#istio-identity>Istio identity</a><li role=none aria-label="Identity and certificate management"><a href=#pki>Identity and certificate management</a><li role=none aria-label=Authentication><a href=#authentication>Authentication</a><ol><li role=none aria-label="Mutual TLS authentication"><a href=#mutual-tls-authentication>Mutual TLS authentication</a><ol><li role=none aria-label="Permissive mode"><a href=#permissive-mode>Permissive mode</a><li role=none aria-label="Secure naming"><a href=#secure-naming>Secure naming</a></ol></li><li role=none aria-label="Authentication architecture"><a href=#authentication-architecture>Authentication architecture</a><li role=none aria-label="Authentication policies"><a href=#authentication-policies>Authentication policies</a><ol><li role=none aria-label="Policy storage"><a href=#policy-storage>Policy storage</a><li role=none aria-label="Selector field"><a href=#selector-field>Selector field</a><li role=none aria-label="Peer authentication"><a href=#peer-authentication>Peer authentication</a><li role=none aria-label="Request authentication"><a href=#request-authentication>Request authentication</a><li role=none aria-label=Principals><a href=#principals>Principals</a></ol></li><li role=none aria-label="Updating authentication policies"><a href=#updating-authentication-policies>Updating authentication policies</a></ol></li><li role=none aria-label=Authorization><a href=#authorization>Authorization</a><ol><li role=none aria-label="Authorization architecture"><a href=#authorization-architecture>Authorization architecture</a><li role=none aria-label="Implicit enablement"><a href=#implicit-enablement>Implicit enablement</a><li role=none aria-label="Authorization policies"><a href=#authorization-policies>Authorization policies</a><ol><li role=none aria-label="Policy Target"><a href=#policy-target>Policy Target</a><li role=none aria-label="Value matching"><a href=#value-matching>Value matching</a><li role=none aria-label="Exclusion matching"><a href=#exclusion-matching>Exclusion matching</a><li role=none aria-label="Allow-all and default deny-all authorization policies"><a href=#allow-all-and-default-deny-all-authorization-policies>Allow-all and default deny-all authorization policies</a><li role=none aria-label="Custom conditions"><a href=#custom-conditions>Custom conditions</a><li role=none aria-label="Authenticated and unauthenticated identity"><a href=#authenticated-and-unauthenticated-identity>Authenticated and unauthenticated identity</a></ol></li><li role=none aria-label="Using Istio authorization on plain TCP protocols"><a href=#using-istio-authorization-on-plain-tcp-protocols>Using Istio authorization on plain TCP protocols</a><li role=none aria-label="Dependency on mutual TLS"><a href=#dependency-on-mutual-tls>Dependency on mutual TLS</a></ol></li><li role=none aria-label="See also"><a href=#see-also>See also</a></li></ol><hr></div></nav><p>Breaking down a monolithic application into atomic services offers various
|
||
benefits, including better agility, better scalability and better ability to
|
||
reuse services. However, microservices also have particular security needs:</p><ul><li>To defend against man-in-the-middle attacks, they need traffic encryption.</li><li>To provide flexible service access control, they need mutual TLS and
|
||
fine-grained access policies.</li><li>To determine who did what at what time, they need auditing tools.</li></ul><p>Istio Security provides a comprehensive security solution to solve these issues.
|
||
This page gives an overview on how you can use Istio security features to secure
|
||
your services, wherever you run them. In particular, Istio security mitigates
|
||
both insider and external threats against your data, endpoints, communication,
|
||
and platform.</p><figure style=width:75%><div class=wrapper-with-intrinsic-ratio style=padding-bottom:56.25%><a data-skipendnotes=true href=/v1.8/docs/concepts/security/overview.svg title="Security overview"><img class=element-to-stretch src=/v1.8/docs/concepts/security/overview.svg alt="Security overview"></a></div><figcaption>Security overview</figcaption></figure><p>The Istio security features provide strong identity, powerful policy,
|
||
transparent TLS encryption, and authentication, authorization and audit (AAA)
|
||
tools to protect your services and data. The goals of Istio security are:</p><ul><li>Security by default: no changes needed to application code and
|
||
infrastructure</li><li>Defense in depth: integrate with existing security systems to provide
|
||
multiple layers of defense</li><li>Zero-trust network: build security solutions on distrusted networks</li></ul><p>Visit our
|
||
<a href=/v1.8/docs/tasks/security/authentication/mtls-migration/>mutual TLS Migration docs</a>
|
||
to start using Istio security features with your deployed services. Visit our
|
||
<a href=/v1.8/docs/tasks/security/>Security Tasks</a> for detailed
|
||
instructions to use the security features.</p><h2 id=high-level-architecture>High-level architecture</h2><p>Security in Istio involves multiple components:</p><ul><li>A Certificate Authority (CA) for key and certificate management</li><li><p>The configuration API server distributes to the proxies:</p><ul><li><a href=/v1.8/docs/concepts/security/#authentication-policies>authentication policies</a></li><li><a href=/v1.8/docs/concepts/security/#authorization-policies>authorization policies</a></li><li><a href=/v1.8/docs/concepts/security/#secure-naming>secure naming information</a></li></ul></li><li><p>Sidecar and perimeter proxies work as <a href=https://www.jerichosystems.com/technology/glossaryterms/policy_enforcement_point.html>Policy Enforcement Points</a>
|
||
(PEPs) to secure communication between clients and servers.</p></li><li><p>A set of Envoy proxy extensions to manage telemetry and auditing</p></li></ul><p>The control plane handles configuration from the API server and
|
||
configures the PEPs in the data plane. The PEPs are implemented using Envoy. The
|
||
following diagram shows the architecture.</p><figure style=width:75%><div class=wrapper-with-intrinsic-ratio style=padding-bottom:47.54566412484483%><a data-skipendnotes=true href=/v1.8/docs/concepts/security/arch-sec.svg title="Security Architecture"><img class=element-to-stretch src=/v1.8/docs/concepts/security/arch-sec.svg alt="Security Architecture"></a></div><figcaption>Security Architecture</figcaption></figure><p>In the following sections, we introduce the Istio security features in detail.</p><h2 id=istio-identity>Istio identity</h2><p>Identity is a fundamental concept of any security infrastructure. At the
|
||
beginning of a workload-to-workload communication, the two parties must exchange
|
||
credentials with their identity information for mutual authentication purposes.
|
||
On the client side, the server’s identity is checked against the
|
||
<a href=/v1.8/docs/concepts/security/#secure-naming>secure naming</a>
|
||
information to see if it is an authorized runner of the workload. On the server
|
||
side, the server can determine what information the client can access based on
|
||
the
|
||
<a href=/v1.8/docs/concepts/security/#authorization-policies>authorization policies</a>,
|
||
audit who accessed what at what time, charge clients based on the workloads they
|
||
used, and reject any clients who failed to pay their bill from accessing the
|
||
workloads.</p><p>The Istio identity model uses the first-class <code>service identity</code> to
|
||
determine the identity of a request’s origin. This model allows for great
|
||
flexibility and granularity for service identities to represent a human user, an
|
||
individual workload, or a group of workloads. On platforms without a service
|
||
identity, Istio can use other identities that can group workload
|
||
instances, such as service names.</p><p>The following list shows examples of service identities that you can use on different
|
||
platforms:</p><ul><li>Kubernetes: Kubernetes service account</li><li>GCE: GCP service account</li><li>On-premises (non-Kubernetes): user account, custom service account,
|
||
service name, Istio service account, or GCP service account. The custom
|
||
service account refers to the existing service account just like the
|
||
identities that the customer’s Identity Directory manages.</li></ul><h2 id=pki>Identity and certificate management</h2><p>Istio securely provisions strong identities
|
||
to every workload with X.509 certificates. Istio agents, running alongside each Envoy proxy,
|
||
work together with <code>istiod</code> to automate key and certificate
|
||
rotation at scale. The following diagram shows the identity
|
||
provisioning flow.</p><figure style=width:40%><div class=wrapper-with-intrinsic-ratio style=padding-bottom:91.58709730986384%><a data-skipendnotes=true href=/v1.8/docs/concepts/security/id-prov.svg title="Identity Provisioning Workflow"><img class=element-to-stretch src=/v1.8/docs/concepts/security/id-prov.svg alt="Identity Provisioning Workflow"></a></div><figcaption>Identity Provisioning Workflow</figcaption></figure><p>Istio provisions keys and certificates through the
|
||
<a href=https://www.envoyproxy.io/docs/envoy/latest/configuration/security/secret#secret-discovery-service-sds>Envoy secret discovery service (SDS)</a>
|
||
using the following flow:</p><ol><li><code>istiod</code> offers a gRPC service to take <a href=https://en.wikipedia.org/wiki/Certificate_signing_request>certificate signing requests</a> (CSRs).</li><li>Envoy sends a certificate and key request via the Envoy SDS API.</li><li>Upon receiving the SDS request, the Istio agent creates the private key
|
||
and CSR before sending the CSR with its credentials to <code>istiod</code> for signing.</li><li>The CA validates the credentials carried in the CSR and signs the CSR to
|
||
generate the certificate.</li><li>The Istio agent sends the certificate received from <code>istiod</code> and the
|
||
private key to Envoy via the Envoy SDS API.</li><li>The above CSR process repeats periodically for certificate and key rotation.</li></ol><h2 id=authentication>Authentication</h2><p>Istio provides two types of authentication:</p><ul><li><p>Peer authentication: used for service-to-service authentication to verify
|
||
the client making the connection. Istio offers <a href=https://en.wikipedia.org/wiki/Mutual_authentication>mutual
|
||
TLS</a> as a full stack
|
||
solution for transport authentication, which can be enabled without
|
||
requiring service code changes. This solution:</p><ul><li>Provides each service with a strong identity representing its role
|
||
to enable interoperability across clusters and clouds.</li><li>Secures service-to-service communication.</li><li>Provides a key management system to automate key and certificate
|
||
generation, distribution, and rotation.</li></ul></li><li><p>Request authentication: Used for end-user authentication to verify the
|
||
credential attached to the request. Istio enables request-level
|
||
authentication with JSON Web Token (JWT) validation and a streamlined
|
||
developer experience using a custom authentication provider or any OpenID
|
||
Connect providers, for example:</p><ul><li><a href=https://www.ory.sh/>ORY Hydra</a></li><li><a href=https://www.keycloak.org/>Keycloak</a></li><li><a href=https://auth0.com/>Auth0</a></li><li><a href=https://firebase.google.com/docs/auth/>Firebase Auth</a></li><li><a href=https://developers.google.com/identity/protocols/OpenIDConnect>Google Auth</a></li></ul></li></ul><p>In all cases, Istio stores the authentication policies in the <code>Istio config
|
||
store</code> via a custom Kubernetes API. <span class=term data-title=Istiod data-body='<p>The Istiod component is the consolidated control plane binary that encapsulates the functions of Pilot, Galley, Citadel, and the sidecar injector.</p>
|
||
|
||
<p><a href="/blog/2020/istiod/">Learn more about Istiod</a>.</p>'>Istiod</span> keeps them up-to-date for each proxy,
|
||
along with the keys where appropriate. Additionally, Istio supports
|
||
authentication in permissive mode to help you understand how a policy change can
|
||
affect your security posture before it is enforced.</p><h3 id=mutual-tls-authentication>Mutual TLS authentication</h3><p>Istio tunnels service-to-service communication through the client- and
|
||
server-side PEPs, which are implemented as <a href=https://envoyproxy.github.io/envoy/>Envoy
|
||
proxies</a>. When a workload sends a request
|
||
to another workload using mutual TLS authentication, the request is handled as
|
||
follows:</p><ol><li>Istio re-routes the outbound traffic from a client to the client’s local
|
||
sidecar Envoy.</li><li>The client side Envoy starts a mutual TLS handshake with the server side
|
||
Envoy. During the handshake, the client side Envoy also does a
|
||
<a href=/v1.8/docs/concepts/security/#secure-naming>secure naming</a>
|
||
check to verify that the service account presented in the server certificate
|
||
is authorized to run the target service.</li><li>The client side Envoy and the server side Envoy establish a mutual TLS
|
||
connection, and Istio forwards the traffic from the client side Envoy to the
|
||
server side Envoy.</li><li>After authorization, the server side Envoy forwards the traffic to the
|
||
server service through local TCP connections.</li></ol><p>Istio configures <code>TLSv1_2</code> as the minimum TLS version for both client and server with
|
||
the following cipher suites:</p><ul><li><p><code>CDHE-ECDSA-AES256-GCM-SHA384</code></p></li><li><p><code>ECDHE-RSA-AES256-GCM-SHA384</code></p></li><li><p><code>ECDHE-ECDSA-AES128-GCM-SHA256</code></p></li><li><p><code>ECDHE-RSA-AES128-GCM-SHA256</code></p></li><li><p><code>AES256-GCM-SHA384</code></p></li><li><p><code>AES128-GCM-SHA256</code></p></li></ul><h4 id=permissive-mode>Permissive mode</h4><p>Istio mutual TLS has a permissive mode, which allows a service to accept both
|
||
plaintext traffic and mutual TLS traffic at the same time. This feature greatly
|
||
improves the mutual TLS onboarding experience.</p><p>Many non-Istio clients communicating with a non-Istio server presents a problem
|
||
for an operator who wants to migrate that server to Istio with mutual TLS
|
||
enabled. Commonly, the operator cannot install an Istio sidecar for all clients
|
||
at the same time or does not even have the permissions to do so on some clients.
|
||
Even after installing the Istio sidecar on the server, the operator cannot
|
||
enable mutual TLS without breaking existing communications.</p><p>With the permissive mode enabled, the server accepts both plaintext and mutual
|
||
TLS traffic. The mode provides greater flexibility for the on-boarding process.
|
||
The server’s installed Istio sidecar takes mutual TLS traffic immediately
|
||
without breaking existing plaintext traffic. As a result, the operator can
|
||
gradually install and configure the client’s Istio sidecars to send mutual TLS
|
||
traffic. Once the configuration of the clients is complete, the operator can
|
||
configure the server to mutual TLS only mode. For more information, visit the
|
||
<a href=/v1.8/docs/tasks/security/authentication/mtls-migration>Mutual TLS Migration tutorial</a>.</p><h4 id=secure-naming>Secure naming</h4><p>Server identities are encoded in certificates, but service names are retrieved
|
||
through the discovery service or DNS. The secure naming information maps the
|
||
server identities to the service names. A mapping of identity <code>A</code> to service
|
||
name <code>B</code> means “<code>A</code> is authorized to run service <code>B</code>”. The control plane watches
|
||
the <code>apiserver</code>, generates the secure naming mappings, and distributes them
|
||
securely to the PEPs. The following example explains why secure naming is
|
||
critical in authentication.</p><p>Suppose the legitimate servers that run the service <code>datastore</code> only use the
|
||
<code>infra-team</code> identity. A malicious user has the certificate and key for the
|
||
<code>test-team</code> identity. The malicious user intends to impersonate the service to
|
||
inspect the data sent from the clients. The malicious user deploys a forged
|
||
server with the certificate and key for the <code>test-team</code> identity. Suppose the
|
||
malicious user successfully hijacked (through DNS spoofing, BGP/route hijacking,
|
||
ARP spoofing, etc.) the traffic sent to the <code>datastore</code> and redirected it to the
|
||
forged server.</p><p>When a client calls the <code>datastore</code> service, it extracts the <code>test-team</code>
|
||
identity from the server’s certificate, and checks whether <code>test-team</code> is
|
||
allowed to run <code>datastore</code> with the secure naming information. The client
|
||
detects that <code>test-team</code> is not allowed to run the <code>datastore</code> service and the
|
||
authentication fails.</p><p>Secure naming is able to protect against general network hijackings for HTTPS
|
||
traffic. It can also protect TCP traffic from general network hijackings.
|
||
However, secure naming doesn’t protect from DNS spoofing because in that case
|
||
attackers hijack the DNS and modify the IP address of the destination. This is
|
||
because TCP traffic does not contain the hostname information and we can only
|
||
rely on the IP address for routing. In fact, this DNS hijack can happen even
|
||
before the client-side Envoy receives the traffic.</p><h3 id=authentication-architecture>Authentication architecture</h3><p>You can specify authentication requirements for workloads receiving requests in
|
||
an Istio mesh using peer and request authentication policies. The mesh operator
|
||
uses <code>.yaml</code> files to specify the policies. The policies are saved in the Istio
|
||
configuration storage once deployed. The Istio controller watches the
|
||
configuration storage.</p><p>Upon any policy changes, the new policy is translated to the appropriate
|
||
configuration telling the PEP how to perform the required authentication
|
||
mechanisms. The control plane may fetch the public key and attach it to the
|
||
configuration for JWT validation. Alternatively, Istiod provides the path to the
|
||
keys and certificates the Istio system manages and installs them to the
|
||
application pod for mutual TLS. You can find more info in the <a href=#pki>Identity and certificate management section</a>.</p><p>Istio sends configurations to the targeted endpoints asynchronously. Once the
|
||
proxy receives the configuration, the new authentication requirement takes
|
||
effect immediately on that pod.</p><p>Client services, those that send requests, are responsible for following the
|
||
necessary authentication mechanism. For request authentication, the application is
|
||
responsible for acquiring and attaching the JWT credential to the request. For
|
||
peer authentication, Istio automatically upgrades all traffic between two PEPs to mutual
|
||
TLS. If authentication policies disable mutual TLS mode, Istio continues to use
|
||
plain text between PEPs. To override this behavior explicitly disable mutual
|
||
TLS mode with
|
||
<a href=/v1.8/docs/concepts/traffic-management/#destination-rules>destination rules</a>.
|
||
You can find out more about how mutual TLS works in the
|
||
<a href=/v1.8/docs/concepts/security/#mutual-tls-authentication>Mutual TLS authentication section</a>.</p><figure style=width:50%><div class=wrapper-with-intrinsic-ratio style=padding-bottom:69.53840153094185%><a data-skipendnotes=true href=/v1.8/docs/concepts/security/authn.svg title="Authentication Architecture"><img class=element-to-stretch src=/v1.8/docs/concepts/security/authn.svg alt="Authentication Architecture"></a></div><figcaption>Authentication Architecture</figcaption></figure><p>Istio outputs identities with both types of authentication, as well as other
|
||
claims in the credential if applicable, to the next layer:
|
||
<a href=/v1.8/docs/concepts/security/#authorization>authorization</a>.</p><h3 id=authentication-policies>Authentication policies</h3><p>This section provides more details about how Istio authentication policies work.
|
||
As you’ll remember from the
|
||
<a href=/v1.8/docs/concepts/security/#authentication-architecture>Architecture section</a>,
|
||
authentication policies apply to requests that a service receives. To specify
|
||
client-side authentication rules in mutual TLS, you need to specify the
|
||
<code>TLSSettings</code> in the <code>DestinationRule</code>. You can find more information in our
|
||
<a href=/v1.8/docs/reference/config/networking/destination-rule#ClientTLSSettings>TLS settings reference docs</a>.</p><p>Like other Istio configurations, you can specify authentication policies in
|
||
<code>.yaml</code> files. You deploy policies using <code>kubectl</code>.
|
||
The following example authentication policy specifies that transport
|
||
authentication for the workloads with the <code>app:reviews</code> label must use mutual
|
||
TLS:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: "security.istio.io/v1beta1"
|
||
kind: "PeerAuthentication"
|
||
metadata:
|
||
name: "example-peer-policy"
|
||
namespace: "foo"
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: reviews
|
||
mtls:
|
||
mode: STRICT
|
||
</code></pre><h4 id=policy-storage>Policy storage</h4><p>Istio stores mesh-scope policies in the root namespace. These policies have an
|
||
empty selector apply to all workloads in the mesh. Policies that have a
|
||
namespace scope are stored in the corresponding namespace. They only apply to
|
||
workloads within their namespace. If you configure a <code>selector</code> field, the
|
||
authentication policy only applies to workloads matching the conditions you
|
||
configured.</p><p>Peer and request authentication policies are stored separately by kind,
|
||
<code>PeerAuthentication</code> and <code>RequestAuthentication</code> respectively.</p><h4 id=selector-field>Selector field</h4><p>Peer and request authentication policies use <code>selector</code> fields to specify the
|
||
label of the workloads to which the policy applies. The following example shows
|
||
the selector field of a policy that applies to workloads with the
|
||
<code>app:product-page</code> label:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>selector:
|
||
matchLabels:
|
||
app: product-page
|
||
</code></pre><p>If you don’t provide a value for the <code>selector</code> field, Istio matches the policy
|
||
to all workloads in the storage scope of the policy. Thus, the <code>selector</code> fields
|
||
help you specify the scope of the policies:</p><ul><li>Mesh-wide policy: A policy specified for the root namespace without or
|
||
with an empty <code>selector</code> field.</li><li>Namespace-wide policy: A policy specified for a non-root namespace without
|
||
or with an empty <code>selector</code> field.</li><li>Workload-specific policy: a policy defined in the regular namespace, with
|
||
non-empty selector field.</li></ul><p>Peer and request authentication policies follow the same hierarchy principles
|
||
for the <code>selector</code> fields, but Istio combines and applies them in slightly
|
||
different ways.</p><p>There can be only one mesh-wide peer authentication policy, and only one
|
||
namespace-wide peer authentication policy per namespace. When you configure
|
||
multiple mesh- or namespace-wide peer authentication policies for the same mesh
|
||
or namespace, Istio ignores the newer policies. When more than one
|
||
workload-specific peer authentication policy matches, Istio picks the oldest
|
||
one.</p><p>Istio applies the narrowest matching policy for each workload using the
|
||
following order:</p><ol><li>workload-specific</li><li>namespace-wide</li><li>mesh-wide</li></ol><p>Istio can combine all matching request authentication policies to work as if
|
||
they come from a single request authentication policy. Thus, you can have
|
||
multiple mesh-wide or namespace-wide policies in a mesh or namespace. However,
|
||
it is still a good practice to avoid having multiple mesh-wide or namespace-wide
|
||
request authentication policies.</p><h4 id=peer-authentication>Peer authentication</h4><p>Peer authentication policies specify the mutual TLS mode Istio enforces on
|
||
target workloads. The following modes are supported:</p><ul><li>PERMISSIVE: Workloads accept both mutual TLS and plain text traffic. This
|
||
mode is most useful during migrations when workloads without sidecar cannot
|
||
use mutual TLS. Once workloads are migrated with sidecar injection, you should
|
||
switch the mode to STRICT.</li><li>STRICT: Workloads only accept mutual TLS traffic.</li><li>DISABLE: Mutual TLS is disabled. From a security perspective, you
|
||
shouldn’t use this mode unless you provide your own security solution.</li></ul><p>When the mode is unset, the mode of the parent scope is inherited. Mesh-wide
|
||
peer authentication policies with an unset mode use the <code>PERMISSIVE</code> mode by
|
||
default.</p><p>The following peer authentication policy requires all workloads in namespace
|
||
<code>foo</code> to use mutual TLS:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: "security.istio.io/v1beta1"
|
||
kind: "PeerAuthentication"
|
||
metadata:
|
||
name: "example-policy"
|
||
namespace: "foo"
|
||
spec:
|
||
mtls:
|
||
mode: STRICT
|
||
</code></pre><p>With workload-specific peer authentication policies, you can specify different
|
||
mutual TLS modes for different ports. You can only use ports that workloads have
|
||
claimed for port-wide mutual TLS configuration. The following example disables
|
||
mutual TLS on port <code>80</code> for the <code>app:example-app</code> workload, and uses the mutual TLS
|
||
settings of the namespace-wide peer authentication policy for all other ports:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: "security.istio.io/v1beta1"
|
||
kind: "PeerAuthentication"
|
||
metadata:
|
||
name: "example-workload-policy"
|
||
namespace: "foo"
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: example-app
|
||
portLevelMtls:
|
||
80:
|
||
mode: DISABLE
|
||
</code></pre><p>The peer authentication policy above works only because the service
|
||
configuration below bound the requests from the <code>example-app</code> workload to port
|
||
<code>80</code> of the <code>example-service</code>:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: v1
|
||
kind: Service
|
||
metadata:
|
||
name: example-service
|
||
namespace: foo
|
||
spec:
|
||
ports:
|
||
- name: http
|
||
port: 8000
|
||
protocol: TCP
|
||
targetPort: 80
|
||
selector:
|
||
app: example-app
|
||
</code></pre><h4 id=request-authentication>Request authentication</h4><p>Request authentication policies specify the values needed to validate a JSON Web
|
||
Token (JWT). These values include, among others, the following:</p><ul><li>The location of the token in the request</li><li>The issuer or the request</li><li>The public JSON Web Key Set (JWKS)</li></ul><p>Istio checks the presented token, if presented against the rules in the request
|
||
authentication policy, and rejects requests with invalid tokens. When requests
|
||
carry no token, they are accepted by default. To reject requests without tokens,
|
||
provide authorization rules that specify the restrictions for specific
|
||
operations, for example paths or actions.</p><p>Request authentication policies can specify more than one JWT if each uses a
|
||
unique location. When more than one policy matches a workload, Istio combines
|
||
all rules as if they were specified as a single policy. This behavior is useful
|
||
to program workloads to accept JWT from different providers. However, requests
|
||
with more than one valid JWT are not supported because the output principal of
|
||
such requests is undefined.</p><h4 id=principals>Principals</h4><p>When you use peer authentication policies and mutual TLS, Istio extracts the
|
||
identity from the peer authentication into the <code>source.principal</code>. Similarly,
|
||
when you use request authentication policies, Istio assigns the identity from
|
||
the JWT to the <code>request.auth.principal</code>. Use these principals to set
|
||
authorization policies and as telemetry output.</p><h3 id=updating-authentication-policies>Updating authentication policies</h3><p>You can change an authentication policy at any time and Istio pushes the new
|
||
policies to the workloads almost in real time. However, Istio can’t guarantee
|
||
that all workloads receive the new policy at the same time. The following
|
||
recommendations help avoid disruption when updating your authentication
|
||
policies:</p><ul><li>Use intermediate peer authentication policies using the <code>PERMISSIVE</code> mode
|
||
when changing the mode from <code>DISABLE</code> to <code>STRICT</code> and vice-versa. When all
|
||
workloads switch successfully to the desired mode, you can apply the policy
|
||
with the final mode. You can use Istio telemetry to verify that workloads
|
||
have switched successfully.</li><li>When migrating request authentication policies from one JWT to another, add
|
||
the rule for the new JWT to the policy without removing the old rule.
|
||
Workloads then accept both types of JWT, and you can remove the old rule
|
||
when all traffic switches to the new JWT. However, each JWT has to use a
|
||
different location.</li></ul><h2 id=authorization>Authorization</h2><p>Istio’s authorization features provide mesh-, namespace-, and workload-wide
|
||
access control for your workloads in the mesh. This level of control provides
|
||
the following benefits:</p><ul><li>Workload-to-workload and end-user-to-workload authorization.</li><li>A Simple API: it includes a single
|
||
<a href=/v1.8/docs/reference/config/security/authorization-policy/><code>AuthorizationPolicy</code> CRD</a>,
|
||
which is easy to use and maintain.</li><li>Flexible semantics: operators can define custom conditions on Istio
|
||
attributes, and use DENY and ALLOW actions.</li><li>High performance: Istio authorization is enforced natively on Envoy.</li><li>High compatibility: supports gRPC, HTTP, HTTPS and HTTP2 natively, as well
|
||
as any plain TCP protocols.</li></ul><h3 id=authorization-architecture>Authorization architecture</h3><p>Each Envoy proxy runs an authorization engine that authorizes requests at
|
||
runtime. When a request comes to the proxy, the authorization engine evaluates
|
||
the request context against the current authorization policies, and returns the
|
||
authorization result, either <code>ALLOW</code> or <code>DENY</code>. Operators specify Istio
|
||
authorization policies using <code>.yaml</code> files.</p><figure style=width:50%><div class=wrapper-with-intrinsic-ratio style=padding-bottom:50.38227195500615%><a data-skipendnotes=true href=/v1.8/docs/concepts/security/authz.svg title="Authorization Architecture"><img class=element-to-stretch src=/v1.8/docs/concepts/security/authz.svg alt="Authorization Architecture"></a></div><figcaption>Authorization Architecture</figcaption></figure><h3 id=implicit-enablement>Implicit enablement</h3><p>You don’t need to explicitly enable Istio’s authorization features. Just apply
|
||
an authorization policy to the workloads to enforce access control.
|
||
For workloads without authorization policies applied, Istio doesn’t enforce
|
||
access control allowing all requests.</p><p>Authorization policies support both <code>ALLOW</code> and <code>DENY</code> actions. The deny
|
||
policies take precedence over allow policies. If any allow policies are applied
|
||
to a workload, access to that workload is denied by default, unless explicitly
|
||
allowed by the rule in the policy. When you apply multiple authorization
|
||
policies to the same workload, Istio applies them additively.</p><h3 id=authorization-policies>Authorization policies</h3><p>To configure an authorization policy, you create an
|
||
<a href=/v1.8/docs/reference/config/security/authorization-policy/><code>AuthorizationPolicy</code> custom resource</a>.
|
||
An authorization policy includes a selector, an action, and a list of rules:</p><ul><li>The <code>selector</code> field specifies the target of the policy</li><li>The <code>action</code> field specifies whether to allow or deny the request</li><li>The <code>rules</code> specify when to trigger the action<ul><li>The <code>from</code> field in the <code>rules</code> specifies the sources of the request</li><li>The <code>to</code> field in the <code>rules</code> specifies the operations of the request</li><li>The <code>when</code> field specifies the conditions needed to apply the rule</li></ul></li></ul><p>The following example shows an authorization policy that allows two sources, the
|
||
<code>cluster.local/ns/default/sa/sleep</code> service account and the <code>dev</code> namespace, to
|
||
access the workloads with the <code>app: httpbin</code> and <code>version: v1</code> labels in the
|
||
<code>foo</code> namespace when requests sent have a valid JWT token.</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: httpbin
|
||
namespace: foo
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: httpbin
|
||
version: v1
|
||
action: ALLOW
|
||
rules:
|
||
- from:
|
||
- source:
|
||
principals: ["cluster.local/ns/default/sa/sleep"]
|
||
- source:
|
||
namespaces: ["dev"]
|
||
to:
|
||
- operation:
|
||
methods: ["GET"]
|
||
when:
|
||
- key: request.auth.claims[iss]
|
||
values: ["https://accounts.google.com"]
|
||
</code></pre><p>The following example shows an authorization policy that denies requests if the
|
||
source is not the <code>foo</code> namespace:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: httpbin-deny
|
||
namespace: foo
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: httpbin
|
||
version: v1
|
||
action: DENY
|
||
rules:
|
||
- from:
|
||
- source:
|
||
notNamespaces: ["foo"]
|
||
</code></pre><p>The deny policy takes precedence over the allow policy. Requests matching allow
|
||
policies can be denied if they match a deny policy. Istio evaluates deny
|
||
policies first to ensure that an allow policy can’t bypass a deny policy.</p><h4 id=policy-target>Policy Target</h4><p>You can specify a policy’s scope or target with the
|
||
<code>metadata/namespace</code> field and an optional <code>selector</code> field.
|
||
A policy applies to the namespace in the <code>metadata/namespace</code> field. If
|
||
set its value to the root namespace, the policy applies to all namespaces in a
|
||
mesh. The value of the root namespace is configurable, and the default is
|
||
<code>istio-system</code>. If set to any other namespace, the policy only applies to the
|
||
specified namespace.</p><p>You can use a <code>selector</code> field to further restrict policies to apply to specific
|
||
workloads. The <code>selector</code> uses labels to select the target workload. The
|
||
selector contains a list of <code>{key: value}</code> pairs, where the <code>key</code> is the name of
|
||
the label. If not set, the authorization policy applies to all workloads in the
|
||
same namespace as the authorization policy.</p><p>For example, the <code>allow-read</code> policy allows <code>"GET"</code> and <code>"HEAD"</code> access to the
|
||
workload with the <code>app: products</code> label in the <code>default</code> namespace.</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: allow-read
|
||
namespace: default
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: products
|
||
action: ALLOW
|
||
rules:
|
||
- to:
|
||
- operation:
|
||
methods: ["GET", "HEAD"]
|
||
</code></pre><h4 id=value-matching>Value matching</h4><p>Most fields in authorization policies support all the following matching
|
||
schemas:</p><ul><li>Exact match: exact string match.</li><li>Prefix match: a string with an ending <code>"*"</code>. For example, <code>"test.abc.*"</code>
|
||
matches <code>"test.abc.com"</code>, <code>"test.abc.com.cn"</code>, <code>"test.abc.org"</code>, etc.</li><li>Suffix match: a string with a starting <code>"*"</code>. For example, <code>"*.abc.com"</code>
|
||
matches <code>"eng.abc.com"</code>, <code>"test.eng.abc.com"</code>, etc.</li><li>Presence match: <code>*</code> is used to specify anything but not empty. To specify
|
||
that a field must be present, use the <code>fieldname: ["*"]</code>format. This is
|
||
different from leaving a field unspecified, which means match anything,
|
||
including empty.</li></ul><p>There are a few exceptions. For example, the following fields only support exact
|
||
match:</p><ul><li>The <code>key</code> field under the <code>when</code> section</li><li>The <code>ipBlocks</code> under the <code>source</code> section</li><li>The <code>ports</code> field under the <code>to</code> section</li></ul><p>The following example policy allows access at paths with the <code>/test/*</code> prefix
|
||
or the <code>*/info</code> suffix.</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: tester
|
||
namespace: default
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: products
|
||
action: ALLOW
|
||
rules:
|
||
- to:
|
||
- operation:
|
||
paths: ["/test/*", "*/info"]
|
||
</code></pre><h4 id=exclusion-matching>Exclusion matching</h4><p>To match negative conditions like <code>notValues</code> in the <code>when</code> field, <code>notIpBlocks</code>
|
||
in the <code>source</code> field, <code>notPorts</code> in the <code>to</code> field, Istio supports exclusion
|
||
matching.
|
||
The following example requires a valid request principals, which is derived from
|
||
JWT authentication, if the request path is not <code>/healthz</code>. Thus, the policy
|
||
excludes requests to the <code>/healthz</code> path from the JWT authentication:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: disable-jwt-for-healthz
|
||
namespace: default
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: products
|
||
action: ALLOW
|
||
rules:
|
||
- to:
|
||
- operation:
|
||
notPaths: ["/healthz"]
|
||
from:
|
||
- source:
|
||
requestPrincipals: ["*"]
|
||
</code></pre><p>The following example denies the request to the <code>/admin</code> path for requests
|
||
without request principals:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: enable-jwt-for-admin
|
||
namespace: default
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: products
|
||
action: DENY
|
||
rules:
|
||
- to:
|
||
- operation:
|
||
paths: ["/admin"]
|
||
from:
|
||
- source:
|
||
notRequestPrincipals: ["*"]
|
||
</code></pre><h4 id=allow-all-and-default-deny-all-authorization-policies>Allow-all and default deny-all authorization policies</h4><p>The following example shows a simple <code>allow-all</code> authorization policy that
|
||
allows full access to all workloads in the <code>default</code> namespace.</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: allow-all
|
||
namespace: default
|
||
spec:
|
||
action: ALLOW
|
||
rules:
|
||
- {}
|
||
</code></pre><p>The following example shows a policy that doesn’t allow any access to all
|
||
workloads in the <code>admin</code> namespace.</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: deny-all
|
||
namespace: admin
|
||
spec:
|
||
{}
|
||
</code></pre><h4 id=custom-conditions>Custom conditions</h4><p>You can also use the <code>when</code> section to specify additional conditions. For
|
||
example, the following <code>AuthorizationPolicy</code> definition includes a condition
|
||
that <code>request.headers[version]</code> is either <code>"v1"</code> or <code>"v2"</code>. In this case, the
|
||
key is <code>request.headers[version]</code>, which is an entry in the Istio attribute
|
||
<code>request.headers</code>, which is a map.</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: httpbin
|
||
namespace: foo
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: httpbin
|
||
version: v1
|
||
action: ALLOW
|
||
rules:
|
||
- from:
|
||
- source:
|
||
principals: ["cluster.local/ns/default/sa/sleep"]
|
||
to:
|
||
- operation:
|
||
methods: ["GET"]
|
||
when:
|
||
- key: request.headers[version]
|
||
values: ["v1", "v2"]
|
||
</code></pre><p>The supported <code>key</code> values of a condition are listed in the
|
||
<a href=/v1.8/docs/reference/config/security/conditions/>conditions page</a>.</p><h4 id=authenticated-and-unauthenticated-identity>Authenticated and unauthenticated identity</h4><p>If you want to make a workload publicly accessible, you need to leave the
|
||
<code>source</code> section empty. This allows sources from all (both authenticated and
|
||
unauthenticated) users and workloads, for example:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: httpbin
|
||
namespace: foo
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: httpbin
|
||
version: v1
|
||
action: ALLOW
|
||
rules:
|
||
- to:
|
||
- operation:
|
||
methods: ["GET", "POST"]
|
||
</code></pre><p>To allow only authenticated users, set <code>principals</code> to <code>"*"</code> instead, for
|
||
example:</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: security.istio.io/v1beta1
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: httpbin
|
||
namespace: foo
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: httpbin
|
||
version: v1
|
||
action: ALLOW
|
||
rules:
|
||
- from:
|
||
- source:
|
||
principals: ["*"]
|
||
to:
|
||
- operation:
|
||
methods: ["GET", "POST"]
|
||
</code></pre><h3 id=using-istio-authorization-on-plain-tcp-protocols>Using Istio authorization on plain TCP protocols</h3><p>Istio authorization supports workloads using any plain TCP protocols, such as
|
||
MongoDB. In this case, you configure the authorization policy in the same way
|
||
you did for the HTTP workloads. The difference is that certain fields and
|
||
conditions are only applicable to HTTP workloads. These fields include:</p><ul><li>The <code>request_principals</code> field in the source section of the authorization
|
||
policy object</li><li>The <code>hosts</code>, <code>methods</code> and <code>paths</code> fields in the operation section of the
|
||
authorization policy object</li></ul><p>The supported conditions are listed in the
|
||
<a href=/v1.8/docs/reference/config/security/conditions/>conditions page</a>.
|
||
If you use any HTTP only fields for a TCP workload, Istio will ignore HTTP-only
|
||
fields in the authorization policy.</p><p>Assuming you have a MongoDB service on port <code>27017</code>, the following example
|
||
configures an authorization policy to only allows the <code>bookinfo-ratings-v2</code>
|
||
service in the Istio mesh to access the MongoDB workload.</p><pre><code class=language-yaml data-expandlinks=true data-repo=istio>apiVersion: "security.istio.io/v1beta1"
|
||
kind: AuthorizationPolicy
|
||
metadata:
|
||
name: mongodb-policy
|
||
namespace: default
|
||
spec:
|
||
selector:
|
||
matchLabels:
|
||
app: mongodb
|
||
action: ALLOW
|
||
rules:
|
||
- from:
|
||
- source:
|
||
principals: ["cluster.local/ns/default/sa/bookinfo-ratings-v2"]
|
||
to:
|
||
- operation:
|
||
ports: ["27017"]
|
||
</code></pre><h3 id=dependency-on-mutual-tls>Dependency on mutual TLS</h3><p>Istio uses mutual TLS to securely pass some information from the client to the
|
||
server. Mutual TLS must be enabled before using any of the following fields in
|
||
the authorization policy:</p><ul><li>the <code>principals</code> field under the <code>source</code> section</li><li>the <code>namespaces</code> field under the <code>source</code> section</li><li>the <code>source.principal</code> custom condition</li><li>the <code>source.namespace</code> custom condition</li><li>the <code>connection.sni</code> custom condition</li></ul><p>Mutual TLS is not required if you don’t use any of the above fields in the
|
||
authorization policy.</p><nav id=see-also><h2>See also</h2><div class=see-also><div class=entry><p class=link><a data-skipendnotes=true href=/v1.8/docs/tasks/security/authorization/authz-td-migration/>Authorization Policy Trust Domain Migration</a></p><p class=desc>Shows how to migrate from one trust domain to another without changing authorization policy.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.8/docs/tasks/security/authorization/authz-http/>Authorization for HTTP traffic</a></p><p class=desc>Shows how to set up access control for HTTP traffic.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.8/docs/tasks/security/authorization/authz-tcp/>Authorization for TCP traffic</a></p><p class=desc>How to set up access control for TCP traffic.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.8/docs/tasks/security/authorization/authz-ingress/>Authorization on Ingress Gateway</a></p><p class=desc>How to set up access control on an ingress gateway.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.8/docs/tasks/security/authorization/authz-deny/>Authorization policies with a deny action</a></p><p class=desc>Shows how to set up access control to deny traffic explicitly.</p></div><div class=entry><p class=link><a data-skipendnotes=true href=/v1.8/blog/2018/istio-authorization/>Micro-Segmentation with Istio Authorization</a></p><p class=desc>Describe Istio's authorization feature and how to use it in various use cases.</p></div></div></nav></article><nav class=pagenav><div class=left><a title="Describes the various Istio features focused on traffic routing and control." href=/v1.8/docs/concepts/traffic-management/><svg class="icon left-arrow"><use xlink:href="/v1.8/img/icons.svg#left-arrow"/></svg>Traffic Management</a></div><div class=right><a title="Describes the telemetry and monitoring features provided by Istio." href=/v1.8/docs/concepts/observability/>Observability<svg class="icon right-arrow"><use xlink:href="/v1.8/img/icons.svg#right-arrow"/></svg></a></div></nav><div id=feedback><div id=feedback-initial>Was this information useful?<br><button class="btn feedback" onclick="sendFeedback('en',1)">Yes</button>
|
||
<button class="btn feedback" onclick="sendFeedback('en',0)">No</button></div><div id=feedback-comment>Do you have any suggestions for improvement?<br><br><input id=feedback-textbox type=text placeholder="Help us improve..." data-lang=en></div><div id=feedback-thankyou>Thanks for your feedback!</div></div><div id=endnotes-container aria-hidden=true><h2>Links</h2><ol id=endnotes></ol></div></div><div class=toc-container><nav class=toc aria-label="Table of Contents"><div id=toc><ol><li role=none aria-label="High-level architecture"><a href=#high-level-architecture>High-level architecture</a><li role=none aria-label="Istio identity"><a href=#istio-identity>Istio identity</a><li role=none aria-label="Identity and certificate management"><a href=#pki>Identity and certificate management</a><li role=none aria-label=Authentication><a href=#authentication>Authentication</a><ol><li role=none aria-label="Mutual TLS authentication"><a href=#mutual-tls-authentication>Mutual TLS authentication</a><ol><li role=none aria-label="Permissive mode"><a href=#permissive-mode>Permissive mode</a><li role=none aria-label="Secure naming"><a href=#secure-naming>Secure naming</a></ol></li><li role=none aria-label="Authentication architecture"><a href=#authentication-architecture>Authentication architecture</a><li role=none aria-label="Authentication policies"><a href=#authentication-policies>Authentication policies</a><ol><li role=none aria-label="Policy storage"><a href=#policy-storage>Policy storage</a><li role=none aria-label="Selector field"><a href=#selector-field>Selector field</a><li role=none aria-label="Peer authentication"><a href=#peer-authentication>Peer authentication</a><li role=none aria-label="Request authentication"><a href=#request-authentication>Request authentication</a><li role=none aria-label=Principals><a href=#principals>Principals</a></ol></li><li role=none aria-label="Updating authentication policies"><a href=#updating-authentication-policies>Updating authentication policies</a></ol></li><li role=none aria-label=Authorization><a href=#authorization>Authorization</a><ol><li role=none aria-label="Authorization architecture"><a href=#authorization-architecture>Authorization architecture</a><li role=none aria-label="Implicit enablement"><a href=#implicit-enablement>Implicit enablement</a><li role=none aria-label="Authorization policies"><a href=#authorization-policies>Authorization policies</a><ol><li role=none aria-label="Policy Target"><a href=#policy-target>Policy Target</a><li role=none aria-label="Value matching"><a href=#value-matching>Value matching</a><li role=none aria-label="Exclusion matching"><a href=#exclusion-matching>Exclusion matching</a><li role=none aria-label="Allow-all and default deny-all authorization policies"><a href=#allow-all-and-default-deny-all-authorization-policies>Allow-all and default deny-all authorization policies</a><li role=none aria-label="Custom conditions"><a href=#custom-conditions>Custom conditions</a><li role=none aria-label="Authenticated and unauthenticated identity"><a href=#authenticated-and-unauthenticated-identity>Authenticated and unauthenticated identity</a></ol></li><li role=none aria-label="Using Istio authorization on plain TCP protocols"><a href=#using-istio-authorization-on-plain-tcp-protocols>Using Istio authorization on plain TCP protocols</a><li role=none aria-label="Dependency on mutual TLS"><a href=#dependency-on-mutual-tls>Dependency on mutual TLS</a></ol></li><li role=none aria-label="See also"><a href=#see-also>See also</a></li></ol></div></nav></div></main><footer><div class=user-links><a class=channel title="Go download Istio 1.8.3 now" href=/v1.8/docs/setup/getting-started/#download aria-label="Download Istio"><span>download</span><svg class="icon download"><use xlink:href="/v1.8/img/icons.svg#download"/></svg>
|
||
</a><a class=channel title="Join the Istio discussion board to participate in discussions and get help troubleshooting problems" href=https://discuss.istio.io aria-label="Istio discussion board"><span>discuss</span><svg class="icon discourse"><use xlink:href="/v1.8/img/icons.svg#discourse"/></svg></a>
|
||
<a class=channel title="Stack Overflow is where you can ask questions and find curated answers on deploying, configuring, and using Istio" href=https://stackoverflow.com/questions/tagged/istio aria-label="Stack Overflow"><span>stack overflow</span><svg class="icon stackoverflow"><use xlink:href="/v1.8/img/icons.svg#stackoverflow"/></svg></a>
|
||
<a class=channel title="Interactively discuss issues with the Istio community on Slack" href=https://slack.istio.io aria-label=slack><span>slack</span><svg class="icon slack"><use xlink:href="/v1.8/img/icons.svg#slack"/></svg></a>
|
||
<a class=channel title="Follow us on Twitter to get the latest news" href=https://twitter.com/IstioMesh aria-label=Twitter><span>twitter</span><svg class="icon twitter"><use xlink:href="/v1.8/img/icons.svg#twitter"/></svg></a><div class=tag>for everyone</div></div><div class=info><p class=copyright>Istio Archive
|
||
1.8.3<br>© 2020 Istio Authors, <a href=https://policies.google.com/privacy>Privacy Policy</a><br>Archived on February 9, 2021</p></div><div class=dev-links><a class=channel title="GitHub is where development takes place on Istio code" href=https://github.com/istio/community aria-label=GitHub><span>github</span><svg class="icon github"><use xlink:href="/v1.8/img/icons.svg#github"/></svg></a>
|
||
<a class=channel title="Access our team drive if you'd like to take a look at the Istio technical design documents" href=https://groups.google.com/forum/#!forum/istio-team-drive-access aria-label="team drive"><span>drive</span><svg class="icon drive"><use xlink:href="/v1.8/img/icons.svg#drive"/></svg></a>
|
||
<a class=channel title="If you'd like to contribute to the Istio project, consider participating in our working groups" href=https://github.com/istio/community/blob/master/WORKING-GROUPS.md aria-label="working groups"><span>working groups</span><svg class="icon working-groups"><use xlink:href="/v1.8/img/icons.svg#working-groups"/></svg></a><div class=tag>for developers</div></div></footer><script src=https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.7/umd/popper.min.js defer></script><div id=scroll-to-top-container aria-hidden=true><button id=scroll-to-top title="Back to top"><svg class="icon top"><use xlink:href="/v1.8/img/icons.svg#top"/></svg></button></div></body></html> |