Skip to content

    Security

    This page describes how to configure security for Kannika Armory during the installation process.

    The property names below are based on the oci://quay.io/kannika/charts/kannika Helm chart.
    When using the oci://quay.io/kannika/charts/kannika-api chart, the api. prefix should be removed from the property names.
    When using the oci://quay.io/kannika/charts/kannika-console chart, the console. prefix should be removed from the property names.

    Configuring security for the API

    Basic authentication

    This is the default authentication method for the API. Use the properties below to configure a username and password. No configuration is needed for the console as it will validate the username and password using the API.

    • api.config.security.enabled
    • api.config.security.username
    • api.config.security.password

    OIDC authentication

    Console configuration

    The Console offers the following options to configure OIDC authentication. When logging in, the console will redirect the user to the authEndpoint using the authorization code flow with PKCE .

    • console.config.security.enabled
    • console.config.security.oidc.enabled
    • console.config.security.oidc.clientId
    • console.config.security.oidc.audience
    • console.config.security.oidc.scope
    • console.config.security.oidc.authEndpoint
    • console.config.security.oidc.tokenEndpoint
    • console.config.security.oidc.logoutEndpoint
    Refresh tokens

    The offline_access scope is requested by the Console, and it will use refresh tokens to keep the access tokens valid. If the OIDC provider doesn’t return a refresh token, the Console will continue to function. However, users will be redirected to the OIDC login page upon navigation when the access token is expired or about to.

    API configuration

    To enable OIDC authentication instead of basic authentication in the API, the following properties can be configured.

    • api.config.security.enabled
    • api.config.security.oidc.issuerUri
    • api.config.security.oidc.audience

    Disable authentication

    Basic authentication is enabled by default. To disable authentication, set the api.config.security.enabled configuration option to false.

    Automatically logout inactive users

    The console can track the user’s activity and log them out automatically if they haven’t interacted with the console for a given time. By default, the user will be shown a warning after 15 minutes of inactivity. Then the user can choose to extend the session or logout. After a minute, the user will be logged out automatically if neither option is chosen.

    To change the default, set console.config.security.userInactivityTimeoutSeconds to the desired timeout in seconds. To disable this feature, set the timeout to 0.