Authorization architecture in microservice cluster

荒凉一梦 提交于 2021-02-08 11:21:43

问题


I have a project with microservice architecture (on Docker and Kubernetes), and 2 main apps are written in Python using AIOHTTP and Django (also there are and Ingress proxy, static files server, a couple more made with NginX). I'd like to split these Python apps into separate smaller microservices, but to accomplish this probably I also should move authentication in a separate app. But how can I do this?

Probably I should also add that I'm asking not about specific authentication methods like OAuth, JWT, etc, but about dependencies and responsibilities splitting inside cluster architecture.

To my mind, a nice solution would be some plugin to Ingress NginX proxy server, or a microservice before it, so that my Python authenticating proxy won't care about methods destination, like some middleware, just read headers/cookies, check access token or sessionId, then set userId if the access is valid, and pass the request further.

A brief and simplified architecture is presented below:

And here is what I imagine, mention fewer complicated connections:

But I'm not sure if this is reasonable. In addition, such approach would reduce advantages of K8s Ingress, which provides amazing interface for updating path table from the bash, but, as far as I know, doesn't allow to run any request handler before it, so I'll have to run custom NginX proxy without nice K8s integration.

Thus, what are other possible architectural solutions?

I could only imagine creation of a single request handler, that performs all the authorisation and passes requests to other microservices (or by RPC), which don't care about authentication, but I don't think this is a generally perfect solution.


回答1:


With microservices, JWT are preferred way of authentication & authorization. You can use cloud resources like GCP IAM or OKTA. OR you can run Keycloak in your cluster as an microservice.

  1. User is created in one of these resources.
  2. Once the user has authenticated, a JWT token is returned (to frontend).
  3. Token contains authentication & authorization related info for that user.
  4. This token is again sent from frontend to backend services in each request.
  5. Backend service will check authentication and authorization and respond accordingly.

Also token is normally valid for fixed amount of time. So frontend app should refresh the token periodically.




回答2:


Theory

Well, I found a lot of info after digging on the Internet and one and a half of consultations. There is an architectural pattern named API Gateway, which describes an entry point in a cluster, and this is just what Kubernetes Ingress does, and what I imagined in my question. In a general case, it is proxy server, which is the only entry point to the cluster microservices, and it may perform caching, DDoS protection, it may support different API protocols, manipulate URIs, manage API throttling, monetisation, and perform the authentication I need. Therefore, there is no authentication during microservices communication inside the cluster, because all the required arguments, identifiers will be presented in the requests.

Implementation

In Kubernetes, NginX Ingress is quite popular, it also supports Basic Auth and OAuth2, which is not a perfect solution, but at leat something. There are alternative Ingress solutions for Kubernetes: Kong, Ambassador, Traefik, which provide much more features (though Kong is based on NginX too).

In the world of Java and Spring the Spring Cloud Gateway exists to solve ssuch problems, which, just like K8s Ingress, allows to describe path tables with YAML, yet it is extendable, allows to easily embed your custom code for any authentication method.

Besides, most of cloud platforms provide their own API gateway services with more or less features, including Google Cloud, Red Hat, AWS, Yandex Cloud. However, it seems they lack authentication methods just like opportunity to be extended, though they aren't much relevant in this question.

To read

You can find more about API Gateway pattern and it's implementations here:

  • microservices.io: API Gateway pattern
  • RedHat: What does an API gateway do?
  • kubernetes.github.io: NginX Ingress External OAUTH Authentication
  • learnK8S.io: Kubernetes API Gateway
  • cloud.spring.io: Spring Cloud Gateway


来源:https://stackoverflow.com/questions/64687757/authorization-architecture-in-microservice-cluster

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!