Modify references from Universal Authentication to Global Authentication
This commit is contained in:
parent
1ac0ca9732
commit
07f9587bc1
@ -28,7 +28,7 @@ A minimal forward authentication service that provides OAuth/SSO login and authe
|
|||||||
- [Forwarded Headers](#forwarded-headers)
|
- [Forwarded Headers](#forwarded-headers)
|
||||||
- [User Restriction](#user-restriction)
|
- [User Restriction](#user-restriction)
|
||||||
- [Applying Authentication](#applying-authentication)
|
- [Applying Authentication](#applying-authentication)
|
||||||
- [Universal Authentication](#universal-authentication)
|
- [Global Authentication](#global-authentication)
|
||||||
- [Individual Ingress Authentication in Kubernetes](#individual-ingress-authentication-in-kubernetes)
|
- [Individual Ingress Authentication in Kubernetes](#individual-ingress-authentication-in-kubernetes)
|
||||||
- [Individual Container Authentication in Swarm](#individual-container-authentication-in-swarm)
|
- [Individual Container Authentication in Swarm](#individual-container-authentication-in-swarm)
|
||||||
- [Rules Based Authentication](#rules-based-authentication)
|
- [Rules Based Authentication](#rules-based-authentication)
|
||||||
@ -328,9 +328,9 @@ The authenticated user is set in the `X-Forwarded-User` header, to pass this on
|
|||||||
|
|
||||||
### Applying Authentication
|
### Applying Authentication
|
||||||
|
|
||||||
Authentication can be applied in a variety of ways, either universally across all requests, or to individual containers/ingresses.
|
Authentication can be applied in a variety of ways, either globally across all requests, or to individual containers/ingresses.
|
||||||
|
|
||||||
#### Universal Authentication
|
#### Global Authentication
|
||||||
|
|
||||||
This can be achieved by enabling forward authentication for an entire entrypoint, for example, with http only:
|
This can be achieved by enabling forward authentication for an entire entrypoint, for example, with http only:
|
||||||
|
|
||||||
@ -411,7 +411,7 @@ See the examples directory for more examples.
|
|||||||
|
|
||||||
#### Rules Based Authentication
|
#### Rules Based Authentication
|
||||||
|
|
||||||
You can also leverage the `rules` config to selectively apply authentication via traefik-forward-auth. For example if you enabled universal authentication by enabling forward authentication for an entire entrypoint, you can still exclude some patterns from requiring authentication:
|
You can also leverage the `rules` config to selectively apply authentication via traefik-forward-auth. For example if you enabled global authentication by enabling forward authentication for an entire entrypoint, you can still exclude some patterns from requiring authentication:
|
||||||
|
|
||||||
```
|
```
|
||||||
# Allow requests to 'dash.example.com'
|
# Allow requests to 'dash.example.com'
|
||||||
|
@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
This is an advanced example of how to deploy traefik and traefik-forward-auth in a single pod. This example is a good starting point for those who already have a manually defined traefik config (e.g. not using helm).
|
This is an advanced example of how to deploy traefik and traefik-forward-auth in a single pod. This example is a good starting point for those who already have a manually defined traefik config (e.g. not using helm).
|
||||||
|
|
||||||
This example uses [Universal Authentication](https://github.com/thomseddon/traefik-forward-auth/blob/master/README.md#universal-authentication) to apply authentication for the entire `https` entrypoint.
|
This example uses [Global Authentication](https://github.com/thomseddon/traefik-forward-auth/blob/master/README.md#global-authentication) to apply authentication for the entire `https` entrypoint.
|
||||||
|
|
||||||
This example also includes SSL via traefik acme/lesencrypt, auth host mode, exposes the traefik dashboard and leverages kustomise. No special config if required for your applications, but a simple example "whoami" application (deployment, service and ingress) is included for completeness.
|
This example also includes SSL via traefik acme/lesencrypt, auth host mode, exposes the traefik dashboard and leverages kustomise. No special config if required for your applications, but a simple example "whoami" application (deployment, service and ingress) is included for completeness.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user