Table of Contents |
---|
...
As you can see from the above image, there is a network traffic between Policy Management Service, A1 Simulator (previously called Near-RT RIC A1 Interface) & DMaaP. The unknown here represents the postman request to the Enrichment Service.
...
Create the RequestAuthentication & Auhorisation Policy in Istio as shown below.
RequestAuthentication:
AuthorizationPolicy:
As you can see from the policy config, the rule is applied on Enrichment Service. Any call to Enrichment Service, the envoy proxy will apply this rule and invoke the Keycloak over OIDC to authenticate the JWT.
...
Create the RequestAuthentication & Auhorisation Policy in Istio as shown below.
RequestAuthentication:
AuthorizationPolicy:
As you can see from the policy config, the rule is applied on Enrichment Service. Any call to Enrichment Service, the envoy proxy will apply this rule and invoke the Keycloak over OIDC to authenticate the JWT.
...