Use the ACL plugin with Consumer Groups in Kong Gateway

Uses: Kong Gateway decK
Minimum Version
Kong Gateway - 3.4
TL;DR

Enable an authentication plugin, create Consumer Groups and Consumers, then enable the ACL plugin and use the config.allow to allow access to the Consumer Groups.

Prerequisites

This is a Konnect tutorial and requires a Konnect personal access token.

  1. Create a new personal access token by opening the Konnect PAT page and selecting Generate Token.

  2. Export your token to an environment variable:

     export KONNECT_TOKEN='YOUR_KONNECT_PAT'
    
    Copied to clipboard!
  3. Run the quickstart script to automatically provision a Control Plane and Data Plane, and configure your environment:

     curl -Ls https://get.konghq.com/quickstart | bash -s -- -k $KONNECT_TOKEN --deck-output
    
    Copied to clipboard!

    This sets up a Konnect Control Plane named quickstart, provisions a local Data Plane, and prints out the following environment variable exports:

     export DECK_KONNECT_TOKEN=$KONNECT_TOKEN
     export DECK_KONNECT_CONTROL_PLANE_NAME=quickstart
     export KONNECT_CONTROL_PLANE_URL=https://us.api.konghq.com
     export KONNECT_PROXY_URL='http://localhost:8000'
    
    Copied to clipboard!

    Copy and paste these into your terminal to configure your session.

Enable key authentication

The ACL plugin requires an authentication plugin. In this example, we’ll use the Key Auth plugin plugin, but you can use any authentication plugin.

echo '
_format_version: "3.0"
plugins:
  - name: key-auth
    config:
      key_names:
      - apikey
' | deck gateway apply -
Copied to clipboard!

Create Consumer Groups

Let’s create two Consumer Groups named dev and admin. These groups will be used to configure access to the Routes we created in the prerequisites.

echo '
_format_version: "3.0"
consumer_groups:
  - name: dev
  - name: admin
' | deck gateway apply -
Copied to clipboard!

Create Consumers

Create Consumers with credentials and assign each of them to a Consumer Group.

echo '
_format_version: "3.0"
consumers:
  - username: Amal
    groups:
    - name: admin
    keyauth_credentials:
    - key: amal
  - username: Dana
    groups:
    - name: dev
    keyauth_credentials:
    - key: dana
' | deck gateway apply -
Copied to clipboard!

Enable the ACL plugin

Enable the ACL plugin for each Route and use the config.allow parameter to allow access to the Consumer Groups. We’ll give the admin Consumer Group access to both Routes, but the dev group will only have access to no-delete-route. This means that only the admin group will be able to use the DELETE method on the /anything endpoint.

echo '
_format_version: "3.0"
plugins:
  - name: acl
    route: delete-route
    config:
      include_consumer_groups: true
      allow:
      - admin
  - name: acl
    route: no-delete-route
    config:
      include_consumer_groups: true
      allow:
      - admin
      - dev
' | deck gateway apply -
Copied to clipboard!

Validate

Send requests to both Routes with the two API keys to validate that the access restrictions work as expected.

With the API key amal, we can send GET, POST, PUT, and DELETE requests to the /anything endpoint:

 curl -X POST "$KONNECT_PROXY_URL/anything" \
     -H "apikey:amal"
Copied to clipboard!
 curl -X DELETE "$KONNECT_PROXY_URL/anything" \
     -H "apikey:amal"
Copied to clipboard!

With the API key dana, we can’t send DELETE requests:

 curl -X DELETE "$KONNECT_PROXY_URL/anything" \
     -H "apikey:dana"
Copied to clipboard!

Cleanup

If you created a new control plane and want to conserve your free trial credits or avoid unnecessary charges, delete the new control plane used in this tutorial.

Did this doc help?

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!