The goal of this workshop is to secure a gateway with OpenID, and have JSON Web tokens relayed to backend services. An OpenID provider, gateway and two backend services have been provided; Up to you to connect the gateway and backend services to Keycloak, and have the Gateway propagate tokens to the backend.
This workshop requires an OpenID Connect provider, client and user to complete. We cover Keycloak setup in our example.
-
Start a local Keycloak instance with Docker
-
Update the
SecurityConfigin thetravel-gatewaymodule -
Update the
application.ymlwith the proper keycloak settings and properly configure the gateway to replay the tokens -
Now we finished the configuration for the
travel-gateway, continue with the hotels and flights services -
Start the flights, hotels and gateway applications and open the webpage. You should see a login screen and once logged in you can navigate through the hotels and flights pages.