Configure OpenID Connect with Consumer Group authorization
Use the OpenID Connect plugin with Consumer Groups for authorization and dynamically map claim values to Consumer Groups. This only allows IdP users that have a matching Consumer Group in Kong Gateway to access your Services, giving you more control over which clients have access to Kong Gateway.
Set up client_credential
authentication and enable Consumer Group mapping by setting a claim to map to.
Prerequisites
Kong Konnect
This is a Konnect tutorial and requires a Konnect personal access token.
-
Create a new personal access token by opening the Konnect PAT page and selecting Generate Token.
-
Export your token to an environment variable:
export KONNECT_TOKEN='YOUR_KONNECT_PAT'
Copied! -
Run the quickstart script to automatically provision a Control Plane and Data Plane, and configure your environment:
curl -Ls https://get.konghq.com/quickstart | bash -s -- -k $KONNECT_TOKEN --deck-output
Copied!This sets up a Konnect Control Plane named
quickstart
, provisions a local Data Plane, and prints out the following environment variable exports:export DECK_KONNECT_TOKEN=$KONNECT_TOKEN export DECK_KONNECT_CONTROL_PLANE_NAME=quickstart export KONNECT_CONTROL_PLANE_URL=https://us.api.konghq.com export KONNECT_PROXY_URL='http://localhost:8000'
Copied!Copy and paste these into your terminal to configure your session.
Kong Gateway running
This tutorial requires Kong Gateway Enterprise. If you don’t have Kong Gateway set up yet, you can use the quickstart script with an enterprise license to get an instance of Kong Gateway running almost instantly.
-
Export your license to an environment variable:
export KONG_LICENSE_DATA='LICENSE-CONTENTS-GO-HERE'
Copied! -
Run the quickstart script:
curl -Ls https://get.konghq.com/quickstart | bash -s -- -e KONG_LICENSE_DATA
Copied!Once Kong Gateway is ready, you will see the following message:
Kong Gateway Ready
decK v1.43+
decK is a CLI tool for managing Kong Gateway declaratively with state files. To complete this tutorial, install decK version 1.43 or later.
This guide uses deck gateway apply
, which directly applies entity configuration to your Gateway instance.
We recommend upgrading your decK installation to take advantage of this tool.
You can check your current decK version with deck version
.
Required entities
For this tutorial, you’ll need Kong Gateway entities, like Gateway Services and Routes, pre-configured. These entities are essential for Kong Gateway to function but installing them isn’t the focus of this guide. Follow these steps to pre-configure them:
-
Run the following command:
echo ' _format_version: "3.0" services: - name: example-service url: http://httpbin.konghq.com/anything routes: - name: example-route paths: - "/anything" service: name: example-service ' | deck gateway apply -
Copied!
To learn more about entities, you can read our entities documentation.
Set up Keycloak
This tutorial requires an identity provider (IdP). If you don’t have one, you can use Keycloak. The steps will be similar in other standard identity providers.
Create a client
-
Install Keycloak (version 26 or later) on your platform.
For example, you can use the Keycloak Docker image:
docker run -p 127.0.0.1:8080:8080 \ -e KC_BOOTSTRAP_ADMIN_USERNAME=admin \ -e KC_BOOTSTRAP_ADMIN_PASSWORD=admin \ quay.io/keycloak/keycloak start-dev
Copied! -
Open the admin console.
The default URL of the console is
http://$YOUR_KEYCLOAK_HOST:8080/admin/master/console/
. - In the sidebar, open Clients, then click Create client.
- Configure the client:
Section |
Settings |
---|---|
General settings |
|
Capability config |
|
Create a claim
- In your client, click the Client scopes tab.
- Click the kong-dedicated client scope.
- Click Configure a new mapper.
- Select Hardcoded claim.
- In the Name field, enter
tier
. - In the Token Claim Name field, enter
tier
. - In the Claim value field, enter
gold
. - Click Save.
Set up keys and credentials
- In your client, open the Credentials tab.
- Set Client Authenticator to Client ID and Secret.
- Copy the Client Secret.
Export to environment variables
Export your client secret and issuer URL to environment variables so that you can pass them more securely. For example:
export DECK_ISSUER="http://host.docker.internal:8080/realms/master"
export CLIENT_SECRET="UNT3GPzCKI7zUbhAmFSUGbj4wmiBDGiW"
export DECK_ISSUER="http://host.docker.internal:8080/realms/master"
export CLIENT_SECRET="UNT3GPzCKI7zUbhAmFSUGbj4wmiBDGiW"
Enable the OpenID Connect plugin
Using the Keycloak and Kong Gateway configuration from the prerequisites,
set up an instance of the OpenID Connect plugin. In this example, we’re using the client_credentials
grant with the tier
Consumer Group claim.
Enable the OpenID Connect plugin on the example-service
Service:
echo '
_format_version: "3.0"
plugins:
- name: openid-connect
service: example-service
config:
issuer: "${{ env "DECK_ISSUER" }}"
auth_methods:
- client_credentials
consumer_groups_claim:
- tier
' | deck gateway apply -
In this example:
-
issuer
: Settings that connect the plugin to your IdP (in this case, the sample Keycloak app). -
auth_methods
: Specifies that the plugin should use the client credentials grant. -
consumer_group_claim
: Looks for a client claim name in the token payload and maps it to the Consumer Group entity by the entity’sname
value.
Create a Consumer Group
First, let’s try to access the Service without a matching Consumer Group. Request the Service with the basic authentication credentials created in the prerequisites:
curl -i -X GET "$KONNECT_PROXY_URL/anything" \
-H "Authorization: Basic kong:wrong-secret"
curl -i -X GET "http://localhost:8000/anything" \
-H "Authorization: Basic kong:wrong-secret"
You should get a 401 Unauthorized
error code, which means the Service is protected by claim authorization.
Create a Consumer Group with a name that matches the client claim value in your IdP, in this case gold
:
echo '
_format_version: "3.0"
consumer_groups:
- name: gold
' | deck gateway apply -
Verify Consumer Group authorization
Now, your configured Consumer Group can access the example-route
Route by using client name and client secret in client-name:client-secret
format:
curl -i -X GET "$KONNECT_PROXY_URL/anything" \
-H "Authorization: Basic kong:$CLIENT_SECRET"
curl -i -X GET "http://localhost:8000/anything" \
-H "Authorization: Basic kong:$CLIENT_SECRET"
This time, you should get a 200
response.
The OIDC plugin decodes the token it receives from the IdP, finds the client claim value, and maps it to our Consumer Group gold
.
Cleanup
Clean up Konnect environment
If you created a new control plane and want to conserve your free trial credits or avoid unnecessary charges, delete the new control plane used in this tutorial.
Destroy the Kong Gateway container
curl -Ls https://get.konghq.com/quickstart | bash -s -- -d