How to’s
in this section, we will explain some mainstream Otoroshi usage scenario’s
- Http WASM
- Otoroshi and WASM
- Wasmo
- Tailscale integration
- End-to-end mTLS
- Send alerts by emails
- Export events to Elasticsearch
- Import/export Otoroshi datastore
- Secure an app with Auth0
- Secure an app with Keycloak
- Secure an app with LDAP
- Secure an api with apikeys
- Secure an app with OAuth1
- Secure an api with OAuth2 client_credentials flow
- Setup an Otoroshi cluster
- TLS termination using Let’s Encrypt
- Secure an app with jwt verifiers
- Secure the communication between a backend app and Otoroshi
- TLS termination using your own certificates
- The resources loader
- Log levels customization
- Initial state customization
- Communicate with Kafka
- Create your custom Authentication module
- Working with Eureka
- Instantiate a WAF with Coraza
- Quickly expose a website and static files