Registering a gateway service

A gateway service is required to handle incoming traffic for APIs.

Before you begin

Before registering a Gateway service in Cloud Manager, the DataPower® API Connect Gateway Service has to either be installed as a subsystem in your Kubernetes cluster or enabled on the DataPower appliance. For a Kubernetes environment, see DataPower Gateway subsystem on Kubernetes. For appliances, see Configuring the API Connect Gateway Service in the appropriate version of the DataPower documentation.
Note:

If you enabled Event Endpoint Management in Cloud Pak for Integration, an Event Gateway Service is provided for event endpoints. For more information about registering an Event Gateway Service, see the Cloud Pak for Integration documentation.

About this task

A Gateway service represents a cluster of gateway servers that host published APIs and provide the API endpoints used by client applications. Gateways execute API proxy invocations to backend systems and enforce API policies including client identification, security and rate limiting.

One of the following roles is required to register and manage a gateway services:

  • Administrator
  • Topology Administrator
  • Owner
  • A custom role with the Topology:Manage permission
Note: You can also register, and manage, gateway services by using the developer toolkit CLI; for details, see the toolkit CLI reference documentation.

Procedure

Complete the following steps to configure a Gateway service for your cloud:

  1. In the Cloud Manager, click TopologyTopology.
  2. From the Availability Zone that will contain the Gateway service, select Register Service.
  3. On the Configure Service page, select DataPower Gateway as the service type. Select the Gateway type that you want to create, either DataPower Gateway (v5 compatible) or DataPower API Gateway. For a description of the gateway types, see API Connect gateway types
  4. Enter the values to configure the Gateway service. You will need to obtain the endpoints from your deployment configuration. For a Kubernetes environment, the endpoints are configured by the following values in the CR (custom resource) file. For an appliance, the endpoint is configured in DataPower.

Field Description
Title (required) Enter a descriptive title for the gateway service. This title will be displayed on the screen.
Name (required) This field is auto-populated by the system and used as the internal field name.
Summary (optional) Enter a brief description.
Management endpoint on the gateway service: Endpoint (required) Enter the API Connect Gateway Service endpoint.
  • For a Kubernetes environment, the Management Endpoint is the endpoint created in the CR (custom resource). See DataPower Gateway subsystem on Kubernetes for more information.
  • For an appliance, the Management Endpoint is the Management address to the API Connect Gateway Service shown in the gateway service connection diagram. For one gateway, this takes the form http://<ip-address-for-gateway>:3000. For multiple gateways, it would be the address:port of the load balancer
  • If you are using in-cluster communication, set this to the service endpoint URL for the gateway, which has the format:
    https://<name>.<namespace>.svc
    where:
    • <name> is the name property from the gateway subsystem CR. If you are using the top-level CR this is <apic instance name>-gw
    • <namespace> is the namespace that the gateway CR exists in.
   
Management endpoint on the gateway service: TLS client profile (required) Specify the TLS client profile to use when the management subsystem initiates communication with the gateway. The client profile contains the TLS client certificate that is presented to the gateway when establishing a secure connection.
Important:
  • Do not leave this property unset. You must specify a client profile for secure management to gateway communication (mTLS). If you do not want to use mTLS, then you can configure JWT instead:
  • The default profile to use is Gateway management client TLS client profile:1.0.0. On a Kubernetes or OpenShift deployment where the management and gateway subsystems are in the same namespace, the gateway service is automatically configured (during installation) to trust the Gateway management client TLS client profile:1.0.0.
  • If you want to use a different client certificate, do not update the Gateway management client TLS client profile:1.0.0, create a new client profile that uses the certificate you want. See Creating a TLS Client Profile.
  • If you are registering a gateway appliance, then configure your gateway to trust the client profile that you select. For more information about configuring TLS on your gateway appliance, see

    Do not configure your gateway appliances with client authentication disabled.

Management endpoint on the gateway service: Use in-cluster communication switch If you want to use in-cluster communication between the management and gateway subsystems, then enable this switch. For more information about this option, see In-cluster or external communication between subsystems. If you are not sure, then leave this switch disabled (the default).
Management endpoint on the gateway service: Use JWT for gateway authentication to analytics service. Available in v10.0.5.4 and later. If you plan to associate an analytics service with this gateway, and you want to use JWT authentication between the gateway and analytics service, then enable this switch. If this switch is not enabled, then mutual TLS authentication is used between the gateway and analytics service. For more information about JWT security, see Enable JWT security instead of mTLS
API invocation endpoint: API endpoint base (required) Enter the base portion of the URL that maps to the base portion of the URL for incoming API traffic. It is a public FQDN with additional paths that are specific to your API calls. For example: https://api.mycompany.com
Note: If you are using the DataPower API Gateway, HTTP/2 is enabled automatically on the API invocation endpoint.

If you are using the DataPower Gateway (v5 compatible), HTTP/2 is not supported on the API invocation endpoint.

API invocation endpoint: Server Name Indication (SNI) - Host name For supporting Server Name Indication (SNI) at the API Endpoint Base. The default hostname of '*' is required to allow all hosts. Enter other host names as needed. Wild card format is supported. The SNI capability enables you to serve multiple TLS secure host names through the same Gateway service, using the same IP address and port, without requiring them to use the same TLS profile.
Note: To allow requests from clients that don't support SNI, you must include a host name value of '*'.
API invocation endpoint: Server Name Indication (SNI) - TLS server profile

The TLS server profile that supports the given hostname for SNI.

The server profile that is selected here contains the server certificate that is presented to callers of the APIs you publish on the gateway. By default this profile is set to Default TLS server profile. Best practice is to create your own TLS server profile that contains the certificate you want on your API invocation endpoint. For more information about configuring TLS server profiles, see TLS profiles overview.

DataPower API Gateway
onlyRestriction: If you are using the DataPower API Gateway, HTTP/2 is enabled automatically on the API invocation endpoint. Therefore, using a TLS server profile that supports only TLS protocol version 1.3 is not supported and will result in the gateway being unable to receive API traffic. You must use a TLS server profile that includes TLS protocol version 1.2 as one of its supported protocols.

This restriction does not apply if you are using the DataPower Gateway (v5 compatible), which does not support HTTP/2.

OAuth shared secret (optional) For sites using native OAuth providers, enter the shared secret that will be used by all API calls going through the gateway.
Note: The specified shared secret must be 64 characters (64 bytes) in length, prefixed with 0x, and must consist only of hexadecimal characters. For example: 0xa354282f227c10250511ae9c9e8c7ed9f4f1bd0d7c04cb6d5bd178f8c62296e3
The following diagram illustrates the gateway service connection:
Gateway service connection on DataPower

  1. When you are finished, click Save.
  2. If you want, you can delete the gateway service as follows;
    1. If the gateway service is already in use by any of the catalogs, you must disable the gateway service as follows:
      1. Log in to API Manager.
      2. Click Manage icon in the API Manager UI navigation pane Manage, then select the catalog.
      3. Click Catalog settings.
      4. Click Gateway services.
      5. Click Edit.
      6. Remove the checkmark from the corresponding gateway service.
      7. Click Save.
    2. Log in to the Cloud Manager user interface.
    3. In the navigation list, click Topology Topology.
    4. Click the options menu icon options icon alongside the corresponding gateway service, then select Delete.
    5. Click Delete on the confirmation prompt.

Results

The Gateway service is added to the appropriate Availability Zone for your cloud.

What to do next

Add additional gateway services. Add one or more analytics services. Add one or more portal services. Associate the gateway service with an analytics service. Set the visibility for the gateway.