The task before us is to create a client facing api for a multi-tenant application using .NET Core. We are gravitating towards Ocelot as the solution for our api gateway. As a multi-tenant provider a requirement for us is that each client/tenant has their own private secret JWT validation key. This feature insures that validation can be managed on a the terms of the tenant. Ocelot, however being a popular choice in .NET Core is not clear (at least to me) on how to achieve this. Any suggestions on the best way to achieve this per-tenant strategy with Ocelot would be greatly appreciated?
Thanks ahead!
The final solution surely depends on the scope of your project, how many tenants you have and how general/dynamic your code must be.
But just to give you something to start with and then you can work on it to make it more flexible:
You can define multiple authentication schemes in your gateway - one per each tenant. Each may have different issuer and different JWT signing key. In your
Program.cs
:Normally in Ocelot if you want to assign authentication scheme to the route you add
AuthenticationOptions
in ocelot config file(s) for each route:But it won't work for you, as you probably want it to be dynamic (multiple tenants per route). In this case you can do the authentication manually by overriding
AuthenticationMiddleware
:Haven't tested it but this idea might work.
As a side note - if you're building a new gateway consider YARP, it's a Microsoft project of reverse proxy which seems to have much better maintenance than Ocelot. Ocelot's head maintainer Tom Pallister has left the project and it has not been receiving much support in recent years:
https://github.com/ThreeMammals/Ocelot/issues/1539
https://github.com/dotnet/docs/issues/27445
However it looks things have improved a bit this year so it's up to you.