You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/proposals/authentication-filter.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -478,7 +478,7 @@ http {
478
478
For JWT Auth, there are two options.
479
479
480
480
1. Local JWKS file stored as a Secret
481
-
2. Remote JWKS from an IdP provider like KeyCloak
481
+
2. Remote JWKS from an IdP provider like Keycloak
482
482
483
483
#### Example JWT AuthenticationFilter with Local JWKS
484
484
@@ -919,7 +919,7 @@ This scenario can use the status `RouteConditionPartiallyInvalid` defined in the
919
919
920
920
The Gateway API defines a means to standardise authentication through use of the [HTTPExternalAuthFilter](https://gateway-api.sigs.k8s.io/reference/spec/#httpexternalauthfilter) available in the HTTPRoute specification.
921
921
922
-
This allows users to reference an external authentication service, such as KeyCloak, to handle the authentication requests.
922
+
This allows users to reference an external authentication service, such as Keycloak, to handle the authentication requests.
923
923
While this API is available in the experimental channel, it is subject to change.
924
924
925
925
Our decision to go forward with our own `AuthenticationFilter` was to ensure we could quickly provide authentication to our users while allowing us to closely monitor progress of the ExternalAuthFilter.
@@ -1030,7 +1030,7 @@ spec:
1030
1030
name: basic-auth-users
1031
1031
```
1032
1032
1033
-
AuthenticationFilter referencing the cross-namespace Secret
0 commit comments