Hey there! xL is correct. We use a lightweight proxy sitting in front of GMS to validate requests across an untrusted network.
Currently the ingestion API provides no authentication mechanisms. That being said, it is something on the core team radar and is in the early stages of thinking currently. We are considering which mechanism for authenticating, as well what the source of truth for authentication credentials, will be. Depending on the approach we decide on the level of work required can vary significantly. Here are a few things we're considering:
⢠File-based username / password authentication (file w/ username and hashed passwords provided at deploy time)
⢠Store-based username / password authentication (db storing username and salted hashed passwords, more work)
⢠Token-based authentication: mechanisms to grant and validate OAuth access + refresh token by the backend APIs, with initial login happening either over OIDC, LDAP, or one of the username / pass mechanisms noted above.
Which approach would best suit your use case?