Credential Injector (proto)

This extension has the qualified name envoy.filters.http.credential_injector

Note

This extension is functional but has not had substantial production burn time, use only with this caveat.

This extension has an unknown security posture and should only be used in deployments where both the downstream and upstream are trusted.

Tip

This extension extends and can be used with the following extension category:

This extension must be configured with one of the following type URLs:

Warning

This API feature is currently work-in-progress. API features marked as work-in-progress are not considered stable, are not covered by the threat model, are not supported by the security team, and are subject to breaking changes. Do not use this feature without understanding each of the previous points.

Credential Injector configuration overview.

extensions.filters.http.credential_injector.v3.CredentialInjector

[extensions.filters.http.credential_injector.v3.CredentialInjector proto]

Credential Injector injects credentials into outgoing HTTP requests. The filter configuration is used to retrieve the credentials, or they can be requested through the OAuth2 client credential grant. The credentials obtained are then injected into the Authorization header of the proxied HTTP requests, utilizing either the Basic or Bearer scheme.

If the credential is not present or there was a failure injecting the credential, the request will fail with 401 Unauthorized unless allow_request_without_credential is set to true.

Notice: This filter is intended to be used for workload authentication, which means that the identity associated with the inserted credential is considered as the identity of the workload behind the envoy proxy(in this case, envoy is typically deployed as a sidecar alongside that workload). Please note that this filter does not handle end user authentication. Its purpose is solely to authenticate the workload itself.

Here is an example of CredentialInjector configuration with Generic credential, which injects an HTTP Basic Auth credential into the proxied requests.

overwrite: true
credential:
  name: generic_credential
  typed_config:
    "@type": type.googleapis.com/envoy.extensions.http.injected_credentials.generic.v3.Generic
    credential:
      name: credential
      sds_config:
        path_config_source:
          path: credential.yaml
    header: Authorization

credential.yaml for Basic Auth:

resources:
- "@type": "type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret"
  name: credential
  generic_secret:
    secret:
      inline_string: "Basic base64EncodedUsernamePassword"

It can also be configured to inject a Bearer token into the proxied requests.

credential.yaml for Bearer Token:

resources:
- "@type": "type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret"
  name: credential
  generic_secret:
    secret:
      inline_string: "Bearer myToken"
{
  "overwrite": ...,
  "allow_request_without_credential": ...,
  "credential": {...}
}
overwrite

(bool) Whether to overwrite the value or not if the injected headers already exist. Value defaults to false.

allow_request_without_credential

(bool) Whether to send the request to upstream if the credential is not present or if the credential injection to the request fails.

By default, a request will fail with 401 Unauthorized if the credential is not present or the injection of the credential to the request fails. If set to true, the request will be sent to upstream without the credential.

credential

(config.core.v3.TypedExtensionConfig, REQUIRED) The credential to inject into the proxied requests

Tip

This extension category has the following known extensions: