@@ -79,6 +79,44 @@ <h2 id="Policy">Policy</h2>
79
79
For each part, if it’s not empty, at least one of those listed credential
80
80
must be provided and (successfully) verified for the authentication to pass.</ p >
81
81
82
+ < p > Examples:
83
+ Policy to enable mTLS for all services in namespace frod</ p >
84
+
85
+ < pre > < code > apiVersion: config.istio.io/v1alpha2
86
+ kind: RouteRule
87
+ metadata:
88
+ name: mTLS-enable
89
+ namespace: frod
90
+ spec:
91
+ match:
92
+ peer:
93
+ - mtls: {}
94
+ </ code > </ pre >
95
+
96
+ < p > Policy to enable mTLS, and use JWT for productpage:9000</ p >
97
+
98
+ < pre > < code > apiVersion: config.istio.io/v1alpha2
99
+ kind: RouteRule
100
+ metadata:
101
+ name: mTLS-enable
102
+ namespace: frod
103
+ spec:
104
+ match:
105
+ - name: productpage
106
+ ports:
107
+ - 9000
108
+ peer:
109
+ - mtls:
110
+ end_user:
111
+ - jwt:
112
+ issuer: "https://securetoken.google.com"
113
+ audiences:
114
+ - "productpage"
115
+ jwks_uri: "https://www.googleapis.com/oauth2/v1/certs"
116
+ locations:
117
+ - header: x-goog-iap-jwt-assertion
118
+ </ code > </ pre >
119
+
82
120
< table >
83
121
< tr >
84
122
< th > Field</ th >
@@ -178,8 +216,7 @@ <h2 id="istio.mixer.v1.config.client.JWT">istio.mixer.v1.config.client.JWT</h2>
178
216
< td > < code > string</ code > </ td >
179
217
< td >
180
218
< p > URL of the provider’s public key set to validate signature of the
181
- JWT. See < a href ="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata "> OpenID
182
- Discovery</ a > .</ p >
219
+ JWT. See < a href ="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata "> OpenID Discovery</ a > .</ p >
183
220
184
221
< p > Optional if the key set document can either (a) be retrieved from
185
222
< a href ="https://openid.net/specs/openid-connect-discovery-1_0.html "> OpenID Discovery</ a >
@@ -195,8 +232,7 @@ <h2 id="istio.mixer.v1.config.client.JWT">istio.mixer.v1.config.client.JWT</h2>
195
232
< td > < code > bool</ code > </ td >
196
233
< td >
197
234
< p > If true, forward the entire base64 encoded JWT in the HTTP request.
198
- If false, remove the JWT from the HTTP request and do not forward to the
199
- application.</ p >
235
+ If false, remove the JWT from the HTTP request and do not forward to the application.</ p >
200
236
201
237
</ td >
202
238
</ tr >
0 commit comments