The Simple Authenticator is a Kubernetes-based tool designed to streamline and enhance basic authentication within a cluster. It serves as a crucial component for managing microservices' security and performance efficiently.
In Kubernetes environments, effective authentication is essential, especially when dealing with internal traffic between microservices.
- NGINX Deployment: Supports both sidecar and standalone deployment of NGINX for secure authentication.
- Adaptive Scale Support: Dynamically scales based on the number of pods in the targeted service, optimizing resource utilization.
- Plain Username and Password Authentication: Simplifies credential management by transforming secrets to NGINX preferences automatically.
The Simple Authenticator ensures that authentication between microservices is both secure and efficient, contributing to a robust and well-architected Kubernetes environment.
Deploy Simple Authenticator using the Makefile:
make deployDeploy Simple Authenticator using Helm:
helm upgrade --install simple-authenticator oci://ghcr.io/snapp-incubator/simple-authenticator/helm-charts/simple-authenticator --version v0.1.8All the operator releases are bundled and pushed to the Snappcloud hub which is a hub for the catalog sources. Install using Operator Lifecycle Manager (OLM) by following these steps:
- Install snappcloud hub catalog-source
- Apply the subscription manifest as shown below:
    apiVersion: operators.coreos.com/v1alpha1
    kind: Subscription
    metadata:
      name: simple-authenticator
      namespace: operators
    spec:
      channel: stable-v1
      installPlanApproval: Automatic
      name: simple-authenticator
      source: snappcloud-hub-catalog
      sourceNamespace: openshift-marketplace
      config:
        resources:
          limits:
            cpu: 2
            memory: 2Gi
          requests:
            cpu: 1
            memory: 1Gi- Install the CRDs into the cluster:
make install- Run your controller (this will run in the foreground, so switch to a new terminal if you want to leave it running):
make runmake docker-build IMG=<desired-image-tag>We use helmify to generate Helm chart from kustomize rendered manifests. To update the chart run:
make helmThe Simple Authenticator operates through the BasicAuthenticator custom resource, providing a straightforward way to manage authentication credentials.
To create a BasicAuthenticator, apply a manifest with your customizations:
apiVersion: authenticator.snappcloud.io/v1alpha1
kind: BasicAuthenticator
metadata:
  name: example-basicauthenticator
  namespace: simple-authenticator-test
spec:
  type: "sidecar" 
  replicas: 2 
  selector: 
    matchLabels:
      app: my-app
  serviceType: "ClusterIP" 
  appPort: 8080
  appService: "my-app-service"
  adaptiveScale: false 
  authenticatorPort: 80 
  credentialsSecretRef: "my-credentials-secret"- type: Sidecar or standalone deployment.
- replicas: Number of replicas (optional, used in deployment mode).
- selector: Selector for targeting specific labels (optional, used in sidecar mode).
- serviceType: Service type (optional).
- appPort: Port where the application is running (required).
- appService: Name of the application service (optional).
- adaptiveScale: Enable or disable adaptive scaling (optional, used in deployment mode).
- authenticatorPort: Port for the authenticator (required).
- credentialsSecretRef: Reference to the credentials secret (optional).
The Simple Authenticator offers two distinct operational modes to cater to different architectural needs in a Kubernetes environment: Deployment Mode and Sidecar Mode.
- Application Service and Port: Target application's service and port.
- Authenticator Port: Port for NGINX deployment to listen to.
- Adaptive Scaling: Automatic scaling based on number of pods of targeted service.
- Replicas: Number of NGINX deployment replicas.
- Application Port: Application's port within the pod.
- Authenticator Port: Port for NGINX sidecar to listen to.
- Selector: Targets specific pod(s) for adding the NGINX sidecar.
Deployment Mode is preferable for scenarios requiring clear separation between the authentication layer and application, and is more scalable for environments with many pods. Sidecar Mode, on the other hand, is suited for scenarios where simplicity, reduced latency, and tight integration between the application and the authentication layer are priorities, albeit at the cost of increased resource consumption per pod.
Secrets specified in credentialsSecretRef must contain username and password fields. If not correctly formatted, the secret will be rejected. Secrets must reside in BasicAuthenticator's namespace.
apiVersion: v1
kind: Secret
metadata:
  name: my-credentials-secret
  namespace: simple-authenticator-test
type: Opaque
stringData:
  username: <username>
  password: <password>If no credentialsSecretRef is set, a secret with a random username and password will be automatically generated.
Contributions are warmly welcomed. Feel free to submit issues or pull requests.
This project is licensed under the Apache License 2.0.