Header configuration (reverse proxy)
To enable Header authentication in the application, you'll have to configure the header that will resolve users & groups:
akhq:
security:
# Header configuration (reverse proxy)
header-auth:
user-header: x-akhq-user # mandatory (the header name that will contain username)
groups-header: x-akhq-group # optional (the header name that will contain groups separated by groups-header-separator)
groups-header-separator: , # optional (separator, defaults to ',')
ip-patterns: [0.0.0.0] # optional (Java regular expressions for matching trusted IP addresses, '0.0.0.0' matches all addresses)
default-group: topic-reader
groups: # optional
# the name of the user group read from header
- name: header-admin-group
groups:
# the corresponding akhq groups (eg. topic-reader/writer or akhq default groups like admin/reader/no-role)
- admin
users: # optional
- username: header-user # username matching the `user-header` value
groups: # list of groups / additional groups
- topic-writer
- username: header-admin
groups:
- admin
user-headeris mandatory in order to map the user withuserslist or to display the user on the ui if nousersis provided.groups-headeris optional and can be used in order to inject a list of groups for all the users. This list will be merged withgroupsfor the current users.groups-header-separatoris optional and can be used to customize group separator used when parsinggroups-headerheader, defaults to,.ip-patternslimits the IP addresses that header authentication will accept, given as a list of Java regular expressions, omit or set to[0.0.0.0]to allow all addressesdefault-groupdefault AKHQ group, used when no groups were read fromgroups-headergroupsmaps external group names read from headers to AKHQ groups.usersassigns additional AKHQ groups to users.