Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Every component in it's own namespace
  2. All "common" components in separate namespaces
  3. No implicit dependencies between common components and ONAP
  4. No nodeports unless really required
  5. istio-ingress used as ingress controller
  6. Up to 4 entrypoints for deployment. For example
    1. simpledemo.onap.org (UI)
    2. south.simpledemo.onap.org (southbound interfaces)
    3. iam.simpledemo.onap.org (keycloak)
    4. api.simpledemo.onap.org (API for OSS/BSS)
  7. Every entrypoint exposed as a separate ingress instance
  8. Every ingress gateway does the SSL termination and reencrypts the traffic and send to the component using mTLS
  9. Istio network policy configured in a way that only desired services can communicate with each other
  10. Auth between services done using certs (mTLS)
  11. OpenID Connect used to authenticate user
  12. In testing deployment keycloak is used but can be replaced with anything else compatible with OIDC
  13. Cert-manager and citadel used to retrieve certificates
  14. Kubernetes is configured to use encryption at rest plugin
  15. ISTIO automated sidecar injection is configured in underlying kubernetes
  16. No root pods
  17. All DB are considered as external
  18. Documented roles
  19. Ability to integrate with LDAP, Kerberos, AAF as IdP
  20. Ability to retrieve the certificate from external CA


Drawio
bordertrue
diagramNamecloud_native_security
simpleViewerfalse
width
linksauto
tbstyletop
lboxtrue
diagramWidth1396
revision2


Drawio
bordertrue
diagramNamekeycloak_options
simpleViewerfalse
width
linksauto
tbstyletop
lboxtrue
diagramWidth1346
revision2