Apply List-Based Access Control
Sometimes, you will require more precise access control than what authentication plugins offer. For example, you might want to keep a whitelist of consumers who can access your API. Now, a consumer must send an authenticated request and be on the whitelist (and not on the blacklist) to access the API.
This tutorial guides you in configuring precise access control by creating a consumer whitelist through the consumer-restriction
plugin.
Prerequisites
Apply Consumer Whitelist
When a consumer makes an authenticated request, API7 Gateway passes on the consumer's name to the routes. So, the routes do not need to access the consumer's credentials directly, which is more user-friendly.
- Dashboard
- ADC
- Ingress Controller
- Select Published Services of your gateway group from the side navigation bar, then select the service you want to configure, for example,
httpbin
with version1.0.0
. - Select Plugins from the side navigation bar, then click Enable Plugin.
- Search for the Consumer Restriction Plugin, then click Enable.
- In the dialog box, do the following:
Add the following configuration to the JSON Editor:
{
"whitelist": [
"Alice"
]
}If you had followed the prerequisite tutorial, you would already have a consumer
Alice
with key authentication credentials.Click Enable.
- Create a new consumer
Lisa
with key authentication credential where Key islisa-key
.
Coming soon.
Ingress Controller currently does not support ApisixService resource.
To configure the consumer-restriction
plugin on a route, update your Kubernetes manifest file of the route as such:
apiVersion: apisix.apache.org/v2
kind: ApisixRoute
metadata:
name: httpbin
namespace: api7 # replace with your namespace
spec:
http:
- name: get-ip
match:
paths:
- /ip
backends:
- serviceName: httpbin
servicePort: 80
plugins:
- name: consumer-restriction
enable: true
config:
whitelist:
- alice
Create another Kubernetes manifest file to configure a consumer lisa
using the ApisixConsumer custom resource:
apiVersion: apisix.apache.org/v2
kind: ApisixConsumer
metadata:
name: lisa
namespace: api7 # replace with your namespace
spec:
authParameter:
keyAuth:
value:
key: "lisa-key"
Apply the configurations to your cluster:
kubectl apply -f httpbin-route.yaml -f consumer.yaml
Validate
Make a request to the service as the consumer Alice
:
curl -i "http://127.0.0.1:9080/ip" -H "apikey: alice-primary-key"
You will see that the request is successful with a 200 OK
response because the consumer Alice
is in the whitelist.
Now, make a request to the service as the newly created consumer Lisa
:
curl -i "http://127.0.0.1:9080/ip" -H "apikey: lisa-key"
You will receive a 403 Forbidden
response with the following request body as the consumer Lisa
was not added to the whitelist:
{"message":"The consumer_name is forbidden."}
Apply Consumer Blacklist
The consumer-restriction
plugin prioritizes the blacklist over the whitelist when determining access.
- Dashboard
- ADC
- Ingress Controller
- Select Published Services of your gateway group from the side navigation bar, then select the service you want to configure, for example,
httpbin
with version1.0.0
. - Select Plugins from the side navigation bar, then click Enable Plugin.
- Search for the
consumer-restriction
plugin, then click Enable. - In the dialog box, do the following:
Add the following configuration to the JSON Editor:
{
"blacklist": [
"Lisa"
]
}If you had followed the prerequisite tutorial, you would already have a consumer
Alice
with key authentication credentials.Click Enable.
- Create a new consumer
Lisa
with key authentication credential where Key islisa-key
.
Coming soon.
Ingress Controller currently does not support ApisixService resource.
To configure the consumer-restriction
plugin on a route, update your Kubernetes manifest file of the route as such:
apiVersion: apisix.apache.org/v2
kind: ApisixRoute
metadata:
name: httpbin
namespace: api7 # replace with your namespace
spec:
http:
- name: get-ip
match:
paths:
- /ip
backends:
- serviceName: httpbin
servicePort: 80
plugins:
- name: consumer-restriction
enable: true
config:
blacklist:
- lisa
Create another Kubernetes manifest file to configure a consumer lisa
using the ApisixConsumer custom resource:
apiVersion: apisix.apache.org/v2
kind: ApisixConsumer
metadata:
name: lisa
namespace: api7 # replace with your namespace
spec:
authParameter:
keyAuth:
value:
key: "lisa-key"
Apply the configurations to your cluster:
kubectl apply -f httpbin-route.yaml -f consumer.yaml
Validate
Make a request to the service as the consumer Alice
:
curl -i "http://127.0.0.1:9080/ip" -H "apikey: alice-primary-key"
You will see that the request is successful with a 200 OK
response because the consumer Alice
is not in the blacklist.
Now, make a request to the service as the newly created consumer Lisa
:
curl -i "http://127.0.0.1:9080/ip" -H "apikey: lisa-key"
You will receive a 403 Forbidden
response with the following request body as the consumer Lisa
was added to the blacklist:
{"message":"The consumer_name is forbidden."}
Additional Resources
- Key Concepts
- API Security
- API Consumption
- Plugin Hub