ProductServiceHttpApiHostModule has some missing configuration for mapping metrics end point.
Please update OnApplicationInitialization
method:
app.UseConfiguredEndpoints();
to
app.UseConfiguredEndpoints(endpoints => endpoints.MapMetrics());
This is fixed and will be available from next version.
It is a default behaviour to inform the user about the process has been stopped and access to the resource has been denied. It is also same behaviour with all main idp as well.
I don't think it is an issue to fix but you can change the url by updating cookie handler like:
.AddCookie("Cookies", options =>
{
options.AccessDeniedPath = "/";
})
If it doesn't work for you, you can check with identityserver github issues or stackoverflow to get faster response since this is not related with ABP.
Check your AccessTokenLifetime
please. Set it to your desire.
If it occurs only in production, it maybe related with your production envrionment time settings. Make sure your server is using automatic time settings.
If you mean API Key Authentication, no; there is no default in-build support for it.
Administration, Identity and Saas services are infrastructural microservices. Abp Suite can not generate pages for these services. If you need to make changes in them, please try adding manually.
This is a different and duplicate question. You can check the answer for this problem in issue#2512.
Error indicates your application can not reach to RabbitMQ. You need to run the infrastructure first in order to start using applications. Here is get started documentation.
As default, RabbitMQ runs on container. If you are using local instance, please check RabbitMQ configuration docs to learn more.
Probably, you are running prometheus on docker but not the applications on docker. That's why it can not bind container name to endpoint.
If you are not running the solution on docker, you may have to change the prometheus static_config targets such as -targets: ['auth-server'] to -targets: ['host.docker.internal:44322']
From infrastructure docs.
Change all the target hosts to host:docker.internal:<port>
.
It is hard to say without seeing logs. Since you have an external web form application, you should follow the guide identityserver 4 defining clients docs.
You can also use identiyserver management ui in admin side. Basically you need to set;
AllowedGrantTypes = code id_token
(hybrid)RedirectUris
PostLogoutRedirectUris
Scopes
Its very important to check logs when if you come across errors.
Do you use microservice template? Share authserver and public web application logs please.