Consumers
In this document, you will learn the basic concepts of consumers in API7 Enterprise Edition and why you need them. You will be introduced to a few relevant concepts, including how to pass consumer information to service upstream, consumer access restriction, as well as consumer authentication and authorization.
Overview
In API7 Enterprise Edition, a consumer object represents a user, application, or host that sends requests to the API gateway and consumes backend services. It is used in conjunction with the authentication system; that is, every consumer should be configured with at least one authentication plugin.
Consumer objects come in handy if you have different consumers sending requests to your system, and you need API7 Enterprise Edition to perform certain functions, such as rate limiting, based on consumers. These functionalities are provided by API7 Enterprise Edition plugins configured in consumers.
The following diagram illustrates an example of API7 Enterprise Edition with one route and two consumers, where one consumer, FetchBot
, is a data fetching bot, and the other consumer, JohnDoe
, is a human end user. Plugin key-auth
is configured on route and consumers, so that requests will be authenticated with API keys. To access the internal service, FetchBot
would send its requests with bot-key
and JohnDoe
would send his request with john-key
.
This configuration ensures that only authenticated requests can interact with the internal service exposed on /store/order
. If a request is sent to API7 Enterprise Edition:
- without any key or with a wrong key, the request is rejected.
- with
bot-key
, the request is authenticated and seen as sent byFetchBot
to fetch data from the internal service. The rate limiting pluginlimit-count
on the consumer takes effect, limiting the number of requests within a 5-second window to 2. If the rate limiting threshold has not been met, the request is forwarded to the upstream service; otherwise, it is rejected. - with
john-key
, the request is authenticated and seen as sent byJohnDoe
, subsequently being forwarded to the upstream service.
Note that the authentication plugin is executed before the rate limiting plugin in this scenario, in accordance with the plugins execution phases.
Authentication & Authorization
There are two main design patterns for building authentication and authorization in an API7 Enterprise Edition-based architecture.
The first and most commonly adopted approach is to authenticate and authorize requests through a third-party identity provider (IdP), such as Keycloak:
In some environments, a request might need to go through more than one IdP before it can be forwarded to the upstream service. In such cases, you can configure multiple authentication plugins, each corresponding to an IdP, on one consumer; only when all IdPs have granted access to a request will API7 Enterprise Edition show success response.
With multiple authentication plugins in place, the plugins order of execution is determined by the plugin's priority, which can be overridden with _meta.priority
.
The second and a more basic approach is to perform authentication and authorization on the API gateway itself, using key-auth
, basic-auth
, jwt-auth
, hmac-auth
plugins: