Over SSL or not, you need to turn on Http2 in ASP.NET Core server. So in appsettings.json, do this.
"Kestrel": {
"EndpointDefaults": {
"Protocols": "Http2"
}
Insecure .NET Framework Client + ASP.NET Core Server
- ASP.NET Core Server
- Remove
app.UseHttpsRedirection()
and app.UseHsts()
in the StartUp
class ConfigureServices(IApplicationBuilder app)
;
- Expose the insecure port, typically 80 or 5000 during development.
- Use the code below to create insecure channel in .NET Framework client.
var channel = new Channel("localhost", 5000, ChannelCredentials.Insecure);
Secure SSL connection .NET Framework Client + ASP.NET Core Server
I got it working with SSL port by using the same Server's certificate in .pem format in the client.
SslCredentials secureCredentials = new SslCredentials(File.ReadAllText("certificate.pem"));
var channel = new Channel("localhost", 5001, secureCredentials);
A bit of explanation. An ASP.NETCore template in VS 2019 uses a development certificate with pfx file at %AppData%ASP.NETHttpsProjectName.pfx
.
The password of the certificate will be available at %AppData%MicrosoftUserSecrets{UserSecretsId}secrets.json
You can get the UserSecretsId
id from the ProjectName.csproj
. This will be different for each ASP.NET Core Project.
We just need the public key of the certificate as a certificate.pem
file to communicate securely over gRPC. Use the command below to extract publickey from pfx
openssl pkcs12 -in "<DiskLocationOfPfx>ProjectName.pfx" -nokeys -out "<TargetLocation>certifcate.pem"
Copy this cerificate.pem
for the gRPC .NET Framework client to use.
SslCredentials secureCredentials = new SslCredentials(File.ReadAllText("<DiskLocationTo the Folder>/certificate.pem"))
var channel = new Channel("localhost", 5001, secureCredentials);
Note that port 5001 I used is the SSL port of my ASP.NET Core application.
For Production Scenarios
Use a valid certificate from certificate signing authority and use same certificate in ASP.NET Core Server and .NET Framework client as pfx
and pem
respectively.
Using Self signed certificate
Using Self signed certificates are a valid option for most microservices that communicate between our own microservices. We may not need an authority signed certificate. One problem we may face with using self signed certificate is that the certificate may be issued to some target DNS name and our gRPC server may be running somewhere else and secure connection cannot be established.
Use gRPC Target Name override keys to override the ssl target name validation.
List<ChannelOption> channelOptions = new List<ChannelOption>()
{
new ChannelOption("grpc.ssl_target_name_override", <DNS to which our certificate is issued to>),
};
SslCredentials secureCredentials = new SslCredentials(File.ReadAllText("certificate.pem"));
var channel = new Channel("localhost", 5001, secureCredentials, channelOptions);