Authentication

User Authentication

Currently, Seldon Deploy SSO can be configured in two ways.

App-level Auth

App-level auth is where a request to seldon deploy is checked for an auth token and if that is missing then Deploy redirects to the auth system.

Deploy uses OIDC and can be integrated to OIDC auth systems.

Kubeflow Gateway Auth

In the kubeflow architecture the auth is done at gateway level, before reaching Deploy or any other apps specifically:

existing_arrikto

This ‘existing_arrikto’ architecture uses an istio envoy filter to run all requests through a check for an auth token, performed by the OIDC AuthService. If no token is available then the user is sent to dex to login and obtain a token.

LDAP, or another external identity provider, can be used as per the existing_arrikto example and in line with the dex documentation.

In order to enforce restrictions, namespaces for Seldon Deploy are labelled as restricted or unrestricted and with the operations that groups can perform on them. See Deployments by Namespace under the Product Tour heading.

Particular paths can also be whitelisted - see Product Tour > Deployment Details View > Requests to Models