How to set up Decentralized Authentication/Authorization in NATS | Rethink Connectivity Episode 6

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ต.ค. 2024
  • Learn how to set up a decentralized security model with NATS operators, accounts and users. In this episode, Jeremy will go over the core design of NATS decentralized auth component, and how to set up your cluster with an operator, accounts and users.
    View the source code for this video here:
    github.com/Con...
    NATS is a connective technology powering modern distributed systems, unifying Cloud, On-Premise, Edge, and IoT.
    Join the NATS Community on Slack: slack.nats.io
    Learn More about NATS at docs.nats.io/

ความคิดเห็น • 39

  • @racm2023
    @racm2023 6 หลายเดือนก่อน +2

    Im a fan of your videos Jeremy! I’m pretty hooked on NATS now thanks to you and want to use it for everything 😅

    • @SynadiaCommunications
      @SynadiaCommunications  5 หลายเดือนก่อน

      Glad to hear it. NATS can do so much and I think it’s a great tool to have in your toolbox

  • @JohnMcclaned
    @JohnMcclaned 2 ปีที่แล้ว +6

    Nats will really take off when there is a GUI to manage the clusters. A high level view of your cluster and being able to see the messages too.

    • @SynadiaCommunications
      @SynadiaCommunications  2 ปีที่แล้ว +4

      Definitely something we are looking into

    • @joeng7424
      @joeng7424 2 ปีที่แล้ว

      Exactly, the moment I saw New Relic Pixie GUI I was immediately hooked.

    • @dalu_
      @dalu_ ปีที่แล้ว

      let me guess, it will be pay only

  • @jeffreyting8042
    @jeffreyting8042 2 ปีที่แล้ว +2

    Great video! I would like to make a suggestion. I know that the secret key can be created through the CLI. In addition to the secret key, these configurations are best reflected in the cluster configuration file. I think this is more suitable for the vast majority of company-level users.

  • @jaysistar2711
    @jaysistar2711 ปีที่แล้ว +3

    I'd really like more videos about permission, and maybe JWT structure for user sessions.

  • @mocktarissa
    @mocktarissa ปีที่แล้ว

    This is the best conceptual explaination I could find . Thank you. Just subscribed.

  • @michaelgrauvogl689
    @michaelgrauvogl689 2 ปีที่แล้ว

    Thank you for this invaluable tutorial. I look forward to the next episode.

  • @Melgaer
    @Melgaer 2 ปีที่แล้ว

    Great video Jeremy, especially the demo part!

  • @zeronamefirstname3628
    @zeronamefirstname3628 ปีที่แล้ว +2

    All sound cool and fun until you want to make NATS system a part of IaC. In this scenario all these steps with nsc are felt more like a nightmare.

  • @dalu_
    @dalu_ ปีที่แล้ว +3

    Ok, I understood. But
    - what about some oidc idp auth? e.g. keycloak
    - this is okfor local services, but let's take a mobile client or websocket client, do you distribute those creds with them so anyone can publicly access them? Isn't that a bit short sighted?

  • @kavishmehta6094
    @kavishmehta6094 2 ปีที่แล้ว

    Awesome video Jeremy!..I was looking for this on, tysm😄

  • @maciejgebarski7850
    @maciejgebarski7850 9 หลายเดือนก่อน

    Great video, i can't wait for next episodes. Do you have in plan make series about NATS administrative ?

  • @serenzei
    @serenzei 2 ปีที่แล้ว +1

    This was great! Started looking into this topic a while ago and this sums it up very well.
    Could you touch upon jetstream enabled leaf nodes/clusters in the future?

  • @BrotherNifty
    @BrotherNifty ปีที่แล้ว

    Great vid. I wonder what something like authzed/spicedb managed RBAC would look like integrated with this nsc

  • @andreyg5875
    @andreyg5875 2 ปีที่แล้ว

    Great! keep it up!

  • @wa1gon
    @wa1gon 7 วันที่ผ่านมา

    You talked about root keys and not using them. What root key and how are the created?

  • @franzandreas3578
    @franzandreas3578 ปีที่แล้ว

    Hi Jeremy, thanks for the cool video. NATS is really awesome! I have a question considering a schema validation. Are there plans for NATS to offer a built in validation - so that the message is rejected while publishing, if a certain schema the message should comply with is not matched? That would be a great feature :-) Keep up the good work!

  • @scottamolinari
    @scottamolinari ปีที่แล้ว

    Nice video.Going from conceptual theory to practical examples is always a great way to get understanding.
    I was wondering, is there an API that can be accessed directly? Obviously, the manual work you just did would be automated and using a CLI is sub-optimal. I'd imagine there is an API that can be accessed directly, right? I guess I could go and look it up in the docs, but I'm just "skimming the tech" currently and the question came to mind.

    • @SynadiaCommunications
      @SynadiaCommunications  ปีที่แล้ว

      Yeah at the end of the day these are all flat files and some get pushed to a server.
      The CLI is built atop a lower level library github.com/nats-io/jwt.
      We also have support in Node as well

    • @scottamolinari
      @scottamolinari ปีที่แล้ว +1

      @@SynadiaCommunications So, the CLI is the only way to make access changes?

  • @neteshkumar7262
    @neteshkumar7262 ปีที่แล้ว

    How to push created operator and account to the NATS server without using the NSC tool, I want to do it using Java only, any reference?

  • @igorrius
    @igorrius 10 หลายเดือนก่อน

    Is there an example of how to work with NSC from a new local environment, for instance using the git?

  • @setharnold9764
    @setharnold9764 ปีที่แล้ว +1

    27:12 I'm surprised you didn't need to nsc push in order to narrow the permissions. What exactly denied this operation?

    • @SynadiaCommunications
      @SynadiaCommunications  ปีที่แล้ว

      That’s the beauty of using a trust chain. Only account JWTs need to be pushed to the server. Users can be created on the fly and don’t need to be stored anywhere, hence the decentralized part.

    • @setharnold9764
      @setharnold9764 ปีที่แล้ว

      @@SynadiaCommunications hopefully, with a bit of use, it becomes obvious which operations happen live, immediately, on the production environment, and which operations just manipulate files on your local system with no influence until pushed. Thanks :)

  • @michaelaidoo5448
    @michaelaidoo5448 ปีที่แล้ว

    hello greate video can you make one configuring with helm making jetstreams with helm infact using helm to do clusters and everything

  • @dalu_
    @dalu_ ปีที่แล้ว +1

    why is this not in the documentation, instead you have to manually create a system account etc, push and change the config and all that...

    • @piengeng
      @piengeng 5 หลายเดือนก่อน

      wondering this myself as well, important information left out in documentation, maybe to promote synadia cloud, sigh~

  • @Hotsummer777
    @Hotsummer777 2 ปีที่แล้ว

    Hello! How much does paid support cost? I wrote to your email, but do not answer me.

  • @michaelaidoo5448
    @michaelaidoo5448 ปีที่แล้ว

    hello greate video can you make one configuring with helm making jetstreams with helm infact using helm to do clusters and everything

  • @michaelaidoo5448
    @michaelaidoo5448 ปีที่แล้ว

    hello greate video can you make one configuring with helm making jetstreams with helm infact using helm to do clusters and everything