3.3 KiB
id, title
id | title |
---|---|
tls | TLS Configuration |
There are two recommended configurations:
Terminate TLS at OAuth2 Proxy
-
Configure SSL Termination with OAuth2 Proxy by providing a
--tls-cert-file=/path/to/cert.pem
and--tls-key-file=/path/to/cert.key
.The command line to run
oauth2-proxy
in this configuration would look like this:./oauth2-proxy \ --email-domain="yourcompany.com" \ --upstream=http://127.0.0.1:8080/ \ --tls-cert-file=/path/to/cert.pem \ --tls-key-file=/path/to/cert.key \ --cookie-secret=... \ --cookie-secure=true \ --provider=... \ --client-id=... \ --client-secret=...
-
With this configuration approach the customization of the TLS settings is limited.
The minimal acceptable TLS version can be set with
--tls-min-version=TLS1.3
. The defaults setTLS1.2
as the minimal version. Regardless of the minimum version configured,TLS1.3
is currently always used as the maximal version.TLS server side cipher suites can be specified with
--tls-cipher-suite=TLS_RSA_WITH_RC4_128_SHA
. If not specified, the defaults fromcrypto/tls
of the currently usedgo
version for buildingoauth2-proxy
will be used. A complete list of valid TLS cipher suite names can be found incrypto/tls
.
Terminate TLS at Reverse Proxy, e.g. Nginx
-
Configure SSL Termination with Nginx (example config below), Amazon ELB, Google Cloud Platform Load Balancing, or ...
Because
oauth2-proxy
listens on127.0.0.1:4180
by default, to listen on all interfaces (needed when using an external load balancer like Amazon ELB or Google Platform Load Balancing) use--http-address="0.0.0.0:4180"
or--http-address="http://:4180"
.Nginx will listen on port
443
and handle SSL connections while proxying tooauth2-proxy
on port4180
.oauth2-proxy
will then authenticate requests for an upstream application. The external endpoint for this example would behttps://internal.yourcompany.com/
.An example Nginx config follows. Note the use of
Strict-Transport-Security
header to pin requests to SSL via HSTS:server { listen 443 default ssl; server_name internal.yourcompany.com; ssl_certificate /path/to/cert.pem; ssl_certificate_key /path/to/cert.key; add_header Strict-Transport-Security max-age=2592000; location / { proxy_pass http://127.0.0.1:4180; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_connect_timeout 1; proxy_send_timeout 30; proxy_read_timeout 30; } }
-
The command line to run
oauth2-proxy
in this configuration would look like this:./oauth2-proxy \ --email-domain="yourcompany.com" \ --upstream=http://127.0.0.1:8080/ \ --cookie-secret=... \ --cookie-secure=true \ --provider=... \ --reverse-proxy=true \ --client-id=... \ --client-secret=...