-
Hi everyone, |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 7 replies
-
Adding some manifests: The security policy: apiVersion: gateway.envoyproxy.io/v1alpha1
kind: SecurityPolicy
metadata:
name: web-oidc
spec:
targetRefs:
- group: gateway.networking.k8s.io
kind: HTTPRoute
name: web
oidc:
provider:
issuer: "https://login.microsoftonline.com/<snip>/v2.0"
clientID: "<snip>"
clientSecret:
name: "web-oidc-secret"
redirectURL: "https://example.com/oauth2/callback"
logoutPath: "/logout" The HTTP route: apiVersion: gateway.networking.k8s.io/v1
kind: HTTPRoute
metadata:
name: web
spec:
hostnames:
- example.com
parentRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: envoy-gateway
sectionName: websecure
rules:
- backendRefs:
- group: ""
kind: Service
name: web
port: 8080
weight: 1
matches:
- path:
type: PathPrefix
value: / And the gateway: apiVersion: gateway.networking.k8s.io/v1
kind: Gateway
metadata:
annotations:
cert-manager.io/cluster-issuer: google-trust-services
name: envoy-gateway
spec:
gatewayClassName: eg
listeners:
- allowedRoutes:
namespaces:
from: All
hostname: example.com
name: websecure
port: 443
protocol: HTTPS
tls:
certificateRefs:
- group: ""
kind: Secret
name: web-tls
mode: Terminate |
Beta Was this translation helpful? Give feedback.
-
Hi @fad3t I'm trying to reproduce this with Entra ID. You could also try the same configuration with the Google OIDC provider and see if it works. |
Beta Was this translation helpful? Give feedback.
Apologies, I just gave it another try and somehow it is now working..
No idea what happened (maybe needed some time for the Entra ID application to become fully available..?).
Thx anyway for your time!