Thank you all for watching and for your support. ►► If you want to master Web API development using best practices, check out our Web API book: bit.ly/3x75ZMM ►► Also, to build great full-stack apps with Blazor, check out our course: bit.ly/3Pw3Y33
I am glad to hear that. Thank you for watching the video. There is also one regarding authentication with Ocelot if you want to give it a try. Feedback is always appreciated.
How to setup this communication in containerization in localhost. I want to setup gateway and functional microservice in localhost. I'm using docker compose for deploying multiple container.
We're going to publish a new course on Microservices very soon. This is a complex topic and hard to answer in a single comment or thread. If you want to, you can register at courses.code-maze.com and wait for the announcement of the course (est. 2-3 weeks). We're going to talk about it on the channel, in one of the future videos as well as well.
Hi. This video was recorded before the auth one, so I didn't link it in the description. But you can find both in the same playlist: ru-vid.com/group/PLkOmPTFOxKBrtoebJJIiPVuCFIWuTLBvr That said, I will add the link to that video in the description now.
Excellent article! If the destination API has security (jwt token), how is the configuration in Ocelot to send the token in the header or does it automatically forward the received headers? Thank you!
To be honest, I wouldn't do it that way because you have to repeat the same logic for each microservices project that you want to protect. But if you have it in that one, you will probably have a separate endpoint for auth, and the ocelot part is the same. You just need to change the upstream part to target a proper URI and provide the proper auth configuration. In the next video that comes out tomorrow, you will see how I handle the auth with Ocelot and Microservices.
@@CodeMaze We are currently using Keycloak and the entire OIDC configuration in the APIs and frontends. I want to implement an ApiGateway, and I wanted to see what the security configuration would be like. Thank you very much for the reply.