RBAC MTls Authenticated Principal (proto)
This extension has the qualified name envoy.rbac.principals.mtls_authenticated
Note
This extension is intended to be robust against both untrusted downstream and upstream traffic.
Tip
This extension extends and can be used with the following extension category:
This extension must be configured with one of the following type URLs:
extensions.rbac.principals.mtls_authenticated.v3.Config
[extensions.rbac.principals.mtls_authenticated.v3.Config proto]
Authentication attributes for a downstream mTLS connection. All modes require that a peer certificate was presented and validated using the ValidationContext in the DownstreamTlsContext configuration.
If neither field is set, a configuration loading error will be generated. This is so that not validating SANs requires an affirmative configuration to disable, to prevent accidentally not configuring SAN validation.
If any_validated_client_certificate
is set in addition to san_matcher
or a future field
which specifies additional validation, the other field always takes precedence over
any_validated_client_certificate
and all specified validation is performed.
{
"san_matcher": {...},
"any_validated_client_certificate": ...
}
- san_matcher
(extensions.transport_sockets.tls.v3.SubjectAltNameMatcher) Specifies a SAN that must be present in the validated peer certificate.
- any_validated_client_certificate
(bool) Only require that the peer certificate is present and valid.