Versatile OpenID Connect stack for ASP.NET Core and Microsoft.Owin (compatible with ASP.NET 4.6.1)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

70 lines
3.2 KiB

using System;
using Microsoft.AspNet.Authentication;
using Microsoft.AspNet.Authentication.Cookies;
using Microsoft.AspNet.Builder;
using Microsoft.AspNet.Http;
using Microsoft.Dnx.Runtime;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.Logging;
using Microsoft.IdentityModel.Protocols;
using Microsoft.IdentityModel.Protocols.OpenIdConnect;
namespace Mvc.Client {
public class Startup {
public void ConfigureServices(IServiceCollection services) {
services.Configure<SharedAuthenticationOptions>(options => {
options.SignInScheme = CookieAuthenticationDefaults.AuthenticationScheme;
});
services.AddAuthentication();
services.AddMvc();
}
public void Configure(IApplicationBuilder app, IRuntimeEnvironment environment) {
var factory = app.ApplicationServices.GetRequiredService<ILoggerFactory>();
factory.AddConsole();
// Insert a new cookies middleware in the pipeline to store the user
// identity after he has been redirected from the identity provider.
app.UseCookieAuthentication(options => {
options.AutomaticAuthentication = true;
options.LoginPath = new PathString("/signin");
});
app.UseOpenIdConnectAuthentication(options => {
// Note: these settings must match the application details
// inserted in the database at the server level.
options.ClientId = "myClient";
options.ClientSecret = "secret_secret_secret";
options.RedirectUri = "http://localhost:53507/oidc";
options.PostLogoutRedirectUri = "http://localhost:53507/";
// Use the authorization code flow.
options.ResponseType = OpenIdConnectResponseTypes.Code;
// Note: setting the Authority allows the OIDC client middleware to automatically
// retrieve the identity provider's configuration and spare you from setting
// the different endpoints URIs or the token validation parameters explicitly.
options.Authority = "http://localhost:54540/";
// Note: the resource property represents the different endpoints the
// access token should be issued for (values must be space-delimited).
options.Resource = "http://localhost:54540/";
options.Scope.Add("email");
// Note: by default, IdentityModel beta8 now refuses to initiate non-HTTPS calls.
// To work around this limitation, the configuration manager is manually
// instantiated with a document retriever allowing HTTP calls.
options.ConfigurationManager = new ConfigurationManager<OpenIdConnectConfiguration>(
metadataAddress: options.Authority + ".well-known/openid-configuration",
configRetriever: new OpenIdConnectConfigurationRetriever(),
docRetriever: new HttpDocumentRetriever { RequireHttps = false });
});
app.UseStaticFiles();
app.UseMvc();
}
}
}