An Identity-Aware Proxy (IAP) sits between the outside world and your services. It verifies identity before traffic reaches the cluster. With Kubernetes Ingress, you can bind IAP logic directly into the entry point for HTTP and HTTPS workloads. This ensures that authentication and authorization happen at the edge, not inside every service.
Kubernetes Ingress controllers — NGINX, Traefik, HAProxy, and others — can integrate with an IAP by adding an auth service or middleware in the request path. The proxy checks identity using OAuth2, OIDC, or SAML, talking to providers like Google, Okta, or Entra ID. Only verified requests pass through. Failed checks stop at the Ingress, saving bandwidth and CPU, and removing attack surface.
This approach centralizes identity enforcement. You do not need per-service authentication code. You standardize on one identity flow, simplify operations, and speed up deployment. Developers focus on business logic, operators manage a single policy set. Auditing becomes cleaner because every request is tied to a verified identity.