All Products
Search
Document Center

Alibaba Cloud Service Mesh:Overview of ASM security policies

Last Updated:Jun 05, 2023

Service Mesh (ASM) provides the security policy feature to encapsulate Istio native security resources based on scenarios. This way, you can complete security configurations with ease in common scenarios. This topic provides an overview of ASM security policies and describes their features.

What are ASM security policies?

If you need advanced security features, you must use multiple Istio native security resources. The configuration of multiple Istio native security resources is complex. The configuration fields are abstract and difficult to understand for people who are not familiar with Istio.

ASM encapsulates Istio native security resources based on common scenarios and provides ASM security policies which are easy to understand and configure. You can view all the Istio native security resources that your ASM security policies use, learn about security resources and concepts, and then customize more complex security capabilities.

Features

You can configure ASM security policies to implement the following features: OpenID Connect (OIDC) single sign-on (SSO), JSON Web Token (JWT) authentication, blacklist and whitelist, and custom authorization.

Feature

Description

References

Authentication

OIDC SSO

OIDC is a protocol for identity authentication and authorization. It is commonly used to implement SSO. ASM allows you to enable OIDC SSO for specific services by using an ingress gateway.

Configure an ASM security policy to implement OIDC SSO

JWT authentication

JWTs are commonly used to authenticate users. ASM allows you to enable JWT authentication for specific requests to access workloads.

Configure an ASM security policy to implement JWT authentication

Authorization

Blacklist and whitelist

Blacklists and whitelists are commonly used to perform access control, which deny or allow specific requests to access applications. ASM allows you to configure blacklists and whitelists to control east-west traffic and north-south traffic.

Configure an ASM security policy to implement blacklist/whitelist access control

Custom authorization service

ASM allows you to forward requests to a custom authorization service that you specify. The custom authorization service authenticates the requests. This way, you can implement complex authentication logic, reduce development and maintenance costs, and improve development efficiency.

Configure an ASM security policy to implement custom authorization