Amitesh, very interesting, we are having the same thoughts around Istio.
ISAM for end user authentication and Istio for transport security and authorisation of microservices communication.
Which role does ISAM play in your setup? Are you using wrp in front of microservices and creating junction?
Or are you using only the federation capabilities.
It would be really interesting if ISAM wrp took a similar approach as Istio with ingress controller/wrp sidecar, and native Kubernetes annotation support.
------------------------------
Øyvind Bergerud
------------------------------
Original Message:
Sent: Thu August 01, 2019 01:19 AM
From: Amitesh Singh
Subject: ISAM9 Docker - Accessing runtime container on non-ssl port
Hi Scott,
Thanks for quick reply.
We are still debugging on issue why ISAM was not responding with MTLS, if no other choice then may be we go with this path.
However, we wanted to streamline ISAM setup with overall architecture where ISAM containers are getting accessed same way as other app's microservices are currently getting accessed.
If we are using service-mesh with MTLS, then I think no point using TLS between service-mesh proxy and services. May be IBM can consider this as enhancement and provide option for both ssl and non-ssl in future?
I can file enhancement request for this.
Thanks,
Amitesh
------------------------------
Amitesh Singh
Original Message:
Sent: Thu August 01, 2019 12:59 AM
From: Scott Exton
Subject: ISAM9 Docker - Accessing runtime container on non-ssl port
Amitesh,
The docker environment was designed to be 'simpler' than a standard appliance environment. This does mean that you lose a little bit flexibility. A decision was made to only allow https access on a fixed port.
Are you only resorting to HTTP access because of the issues that you experienced with HTTPS access? If so, was any debugging attempted to try and work out why ISAM was not responding with MTLS?
Thanks,
Scott.
------------------------------
Scott Exton
IBM
Gold Coast
Original Message:
Sent: Thu August 01, 2019 12:27 AM
From: Amitesh Singh
Subject: ISAM9 Docker - Accessing runtime container on non-ssl port
Hi Scott,
In our environment we are using Istio Service Mesh and running all microservices in HTTP (non-ssl) mode. Istio proxy (or sidecar) is configured to use mtls when talking to microservices. In this case we don need my ISAM runtime microservice to only access via https. We want to standardize the way communication happening between each microservices (including ISAM containers). Also, somehow the issue is when we enable mtls between sidecars of app microservice and ISAM runtime container, ISAM runtime did not respond, so the only choice we have left with is not using mtls when calling app microservice calling ISAM runtime's sidecar.
May I know why it is different from physical/virtual appliances where we had choice to configure interface/port for runtime of our choice?
Thanks,
Amitesh
------------------------------
Amitesh Singh
Original Message:
Sent: Wed July 31, 2019 06:14 AM
From: Scott Exton
Subject: ISAM9 Docker - Accessing runtime container on non-ssl port
Amitesh,
The runtime interface of the runtime/WebSEAL containers listen on port 443 (port 9443 is reserved for management requests). There is no way to enable the non-ssl port. Are you able to explain further why you need a non-ssl port and cannot use the ssl port.
Thanks.
------------------------------
Scott Exton
IBM
Gold Coast
Original Message:
Sent: Tue July 30, 2019 12:54 AM
From: Amitesh Singh
Subject: ISAM9 Docker - Accessing runtime container on non-ssl port
Hi All,
We have our ISAM containers installed with Istio, any micro services accessing ISAM runtime, need to access by Istio's sidecar. We want to enable non-ssl port 80 between sidecar and ISAM runtime container.
In VA version we had the option to define ip and ports for accessing runtime but in docker container, ISAM only allows access runtime using port 9443. Can anyone know how to change 9443 port to non-ssl port 80 for ISAM runtime container?
Thanks,
Amitesh
------------------------------
Amitesh Singh
------------------------------