Ingress
Namespace instances can create ingresses exposing container ports. Ingresses preserve original headers for application-level routing and support path-based and header-based routing within your application.
Managed TLS Certificates
All ingresses use managed TLS certificates. Namespace's ingress manager automatically provisions and rotates TLS certificates ensuring secure connections with zero-downtime renewals. In case of wildcard previews, all subdomains receive a valid TLS certificate.
Custom Domain Support
Custom ingress domain support enables white-label preview environments with your organization's branding and domain structure. Through customizing the domain used for your ingresses, you can ensure brand consistency across development and production environments.
Registering a custom ingress domain is limited to enterprise customers.
Access Controls
By default, any member of your workspace has access to any ingress. Namespace ensures high security standards and comprehensive access control mechanisms to help you manage who can access your workspace and what actions they can perform.
More information on Workspace access
Unauthenticated Access
When creating an ingress, you can permit unauthenticated access for it. This can be useful to simplify end-to-end test setups, especially if not all parts of your testing pipeline run on Namespace. To learn how to allow unauthenticated ingress access, check out the reference documentation.
Custom Authentication Providers
Apart from workspace-level access controls, Namespace also supports custom authentication providers allowing you to maintain full control over who is supposed to access which ingress. This option is beneficial if you want to grant ingress access to people outside your workspace, without disabling ingress authentication entirely.
Registering a custom authentication provider is limited to enterprise customers.
Programmatic Access
When accessing authenticated ingresses exposed on Namespace from a browser, Namespace automatically performs an authorization flow.
In order to access an ingress endpoint programmatically, add the x-nsc-ingress-auth
HTTP header. The content should be a bearer token containing an ingress access token.