Chapter 5. Configuring Endpoints to Use Interceptors