- The Mapping Resource
- Automatic Retries
- Canary Releases
- Circuit Breakers
- Cross-Origin Resource Sharing
- Method-based Routing
- Prefix Regex
- Traffic Shadowing
- Developer Portal
- Edge Policy Console
- The Ambassador Module
- Gzip Compression
- Host CRD, ACME Support, and External Load Balancer Configuration
- Ingress Controller
- Troubleshooting Ambassador
- Custom Filters
- Deploying to Kubernetes from GitHub
- Knative Serverless Framework
- Prometheus monitoring
- Frequently Asked Questions
With Auth0 as your IdP, you will need to create an
Application to handle authentication requests from Ambassador Edge Stack.
Navigate to Applications and Select "CREATE APPLICATION"
In the pop-up window, give the application a name and create a "Machine to Machine App"
Select the Auth0 Management API. Grant any scopes you may require. (You may grant none.) The API is required so that an
audiencecan be specified which will result in a JWT being returned rather than opaque token. A custom API can also be used.
In your newly created application, click on the Settings tab, add the Domain and Callback URLs for your service and ensure the "Token Endpoint Authentication Method" is set to
Post. The default YAML installation of Ambassador Edge Stack uses
/.ambassador/oauth2/redirection-endpointfor the URL, so the values should be the domain name that points to Ambassador, e.g.,
Click Advanced Settings > Grant Types and check "Authorization Code"
Update the Auth0
FilterPolicy. You can get the
secret from your application settings:
audience is the API Audience of your Auth0 Management API:
authorizationURL is your Auth0 tenant URL.
---apiVersion: getambassador.io/v2kind: Filtermetadata:name: auth0_filternamespace: defaultspec:OAuth2:authorizationURL: https://datawire-ambassador.auth0.comextraAuthorizationParameters:audience: https://datawire-ambassador.auth0.com/api/v2/clientID: fCRAI7svzesD6p8Pv22wezyYXNg80Ho8secret: CLIENT_SECRETprotectedOrigins:- origin: https://datawire-ambassador.com
---apiVersion: getambassador.io/v2kind: FilterPolicymetadata:name: httpbin-policynamespace: defaultspec:rules:- host: "*"path: /httpbin/ipfilters:- name: auth0_filter ## Enter the Filter name from abovearguments:scopes:- "openid"
Note: By default, Auth0 requires the