-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Admin API security #133
Comments
Maybe this could be a plugin? |
+1 for plugin. by default localhost, plugin to manage additional sources. |
EVERYTHING should be a plugin. the core kong as lightweight as possible. |
API Admin plugin |
I like default how it is currently. Anyone in production will set up appropriate firewalls using iptables, AWS security groups, or running their Kong(s) in an internal private network which is blocked off from public access except for port 80. I agree with the plugin, it would be nice to have a whitelist & blacklist plus support for matching subnets. This would allow us to be on par with nginx's |
It's related to #379. |
We should find a way to use existing plugins for the admin API. @thibaultcha Including CORS, user authentication, IP whitelisting/blacklisting, etc. While still having the admin running separately. This means that the plugin execution handlers in |
^ Kong Shield: can be new commercial solution. Enterprise Admin Governance. |
How are people securing the admin api in production environments? I would assume that if someone added/changed/deleted an API through the ADMIN API, you would want to know who did it. |
They put the port behind a firewall for internal usage only. |
We have published a doc that highlights some of the best practices we suggest when considering securing the Admin API: https://getkong.org/docs/0.10.x/secure-admin-api/ |
Worth noting here that Kong Enterprise now supports RBAC! Not sure how much value is left in keeping this issue open... |
In
kong.yml
it would be nice to have a configuration entry that protects the management API, for example:The text was updated successfully, but these errors were encountered: