if you enabled service center RBAC.
you can choose to enable kie RBAC feature, after enable RBAC, all request to kie must be authenticated
follow steps to enable service center RBAC.
1.get public key file which is exactly same with service center public key file
2.edit kie-conf.yaml
db: uri: mongodb://kie:123@127.0.0.1:27017/kie type: mongodb rbac: enabled: true rsaPublicKeyFile: ./examples/dev/public.key
To distribute your public key, you can use kubernetes config map to manage public key
token is the only credential to access rest API, before you access any API, you need to get a token from service center
curl -X POST \ http://127.0.0.1:30100/v4/token \ -d '{"name":"root", "password":"rootpwd"}'
will return a token, token will expired after 30m
{"token":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOjE1OTI4MzIxODUsInVzZXIiOiJyb290In0.G65mgb4eQ9hmCAuftVeVogN9lT_jNg7iIOF_EAyAhBU"}
For each request you must add token to http header:
Authorization: Bearer {token}
for example:
curl -X GET \ 'http://127.0.0.1:30110/v1/default/kie/kv' \ -H 'Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOjE1OTI4OTQ1NTEsInVzZXIiOiJyb290In0.FfLOSvVmHT9qCZSe_6iPf4gNjbXLwCrkXxKHsdJoQ8w'