How to set up Decentralized Authentication/Authorization in NATS | Rethink Connectivity Episode 6

Поделиться
HTML-код
  • Опубликовано: 8 фев 2025
  • Learn how to set up a decentralized security model with NATS operators, accounts and users. In this episode, Jeremy will go over the core design of NATS decentralized auth component, and how to set up your cluster with an operator, accounts and users.
    View the source code for this video here:
    github.com/Con...
    NATS is a connective technology powering modern distributed systems, unifying Cloud, On-Premise, Edge, and IoT.
    Join the NATS Community on Slack: slack.nats.io
    Learn More about NATS at docs.nats.io/

Комментарии • 39

  • @racm2023
    @racm2023 10 месяцев назад +2

    Im a fan of your videos Jeremy! I’m pretty hooked on NATS now thanks to you and want to use it for everything 😅

    • @SynadiaCommunications
      @SynadiaCommunications  9 месяцев назад

      Glad to hear it. NATS can do so much and I think it’s a great tool to have in your toolbox

  • @jeffreyting8042
    @jeffreyting8042 2 года назад +2

    Great video! I would like to make a suggestion. I know that the secret key can be created through the CLI. In addition to the secret key, these configurations are best reflected in the cluster configuration file. I think this is more suitable for the vast majority of company-level users.

  • @mocktarissa
    @mocktarissa Год назад

    This is the best conceptual explaination I could find . Thank you. Just subscribed.

  • @JohnMcclaned
    @JohnMcclaned 2 года назад +6

    Nats will really take off when there is a GUI to manage the clusters. A high level view of your cluster and being able to see the messages too.

    • @SynadiaCommunications
      @SynadiaCommunications  2 года назад +4

      Definitely something we are looking into

    • @joeng7424
      @joeng7424 2 года назад

      Exactly, the moment I saw New Relic Pixie GUI I was immediately hooked.

    • @dalu_
      @dalu_ Год назад

      let me guess, it will be pay only

  • @michaelgrauvogl689
    @michaelgrauvogl689 2 года назад

    Thank you for this invaluable tutorial. I look forward to the next episode.

  • @Melgaer
    @Melgaer 2 года назад

    Great video Jeremy, especially the demo part!

  • @maciejgebarski7850
    @maciejgebarski7850 Год назад

    Great video, i can't wait for next episodes. Do you have in plan make series about NATS administrative ?

  • @dalu_
    @dalu_ Год назад +5

    Ok, I understood. But
    - what about some oidc idp auth? e.g. keycloak
    - this is okfor local services, but let's take a mobile client or websocket client, do you distribute those creds with them so anyone can publicly access them? Isn't that a bit short sighted?

  • @kavishmehta6094
    @kavishmehta6094 2 года назад

    Awesome video Jeremy!..I was looking for this on, tysm😄

  • @jaysistar2711
    @jaysistar2711 Год назад +3

    I'd really like more videos about permission, and maybe JWT structure for user sessions.

  • @wa1gon
    @wa1gon 4 месяца назад

    You talked about root keys and not using them. What root key and how are the created?

  • @setharnold9764
    @setharnold9764 2 года назад +1

    27:12 I'm surprised you didn't need to nsc push in order to narrow the permissions. What exactly denied this operation?

    • @SynadiaCommunications
      @SynadiaCommunications  2 года назад +1

      That’s the beauty of using a trust chain. Only account JWTs need to be pushed to the server. Users can be created on the fly and don’t need to be stored anywhere, hence the decentralized part.

    • @setharnold9764
      @setharnold9764 2 года назад

      @@SynadiaCommunications hopefully, with a bit of use, it becomes obvious which operations happen live, immediately, on the production environment, and which operations just manipulate files on your local system with no influence until pushed. Thanks :)

  • @serenzei
    @serenzei 2 года назад +1

    This was great! Started looking into this topic a while ago and this sums it up very well.
    Could you touch upon jetstream enabled leaf nodes/clusters in the future?

  • @BrotherNifty
    @BrotherNifty Год назад

    Great vid. I wonder what something like authzed/spicedb managed RBAC would look like integrated with this nsc

  • @scottamolinari
    @scottamolinari Год назад

    Nice video.Going from conceptual theory to practical examples is always a great way to get understanding.
    I was wondering, is there an API that can be accessed directly? Obviously, the manual work you just did would be automated and using a CLI is sub-optimal. I'd imagine there is an API that can be accessed directly, right? I guess I could go and look it up in the docs, but I'm just "skimming the tech" currently and the question came to mind.

    • @SynadiaCommunications
      @SynadiaCommunications  Год назад

      Yeah at the end of the day these are all flat files and some get pushed to a server.
      The CLI is built atop a lower level library github.com/nats-io/jwt.
      We also have support in Node as well

    • @scottamolinari
      @scottamolinari Год назад +1

      @@SynadiaCommunications So, the CLI is the only way to make access changes?

  • @andreyg5875
    @andreyg5875 2 года назад

    Great! keep it up!

  • @neteshkumar7262
    @neteshkumar7262 Год назад

    How to push created operator and account to the NATS server without using the NSC tool, I want to do it using Java only, any reference?

  • @igorrius
    @igorrius Год назад

    Is there an example of how to work with NSC from a new local environment, for instance using the git?

  • @franzandreas3578
    @franzandreas3578 2 года назад

    Hi Jeremy, thanks for the cool video. NATS is really awesome! I have a question considering a schema validation. Are there plans for NATS to offer a built in validation - so that the message is rejected while publishing, if a certain schema the message should comply with is not matched? That would be a great feature :-) Keep up the good work!

  • @dalu_
    @dalu_ Год назад +1

    why is this not in the documentation, instead you have to manually create a system account etc, push and change the config and all that...

    • @piengeng
      @piengeng 9 месяцев назад

      wondering this myself as well, important information left out in documentation, maybe to promote synadia cloud, sigh~

  • @michaelaidoo5448
    @michaelaidoo5448 Год назад

    hello greate video can you make one configuring with helm making jetstreams with helm infact using helm to do clusters and everything

  • @zeronamefirstname3628
    @zeronamefirstname3628 Год назад +2

    All sound cool and fun until you want to make NATS system a part of IaC. In this scenario all these steps with nsc are felt more like a nightmare.

  • @Hotsummer777
    @Hotsummer777 2 года назад

    Hello! How much does paid support cost? I wrote to your email, but do not answer me.

  • @michaelaidoo5448
    @michaelaidoo5448 Год назад

    hello greate video can you make one configuring with helm making jetstreams with helm infact using helm to do clusters and everything

  • @michaelaidoo5448
    @michaelaidoo5448 Год назад

    hello greate video can you make one configuring with helm making jetstreams with helm infact using helm to do clusters and everything