Versatile OpenID Connect stack for ASP.NET Core and Microsoft.Owin (compatible with ASP.NET 4.6.1)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

55 lines
2.1 KiB

using Microsoft.AspNetCore.Authentication.Cookies;
using Microsoft.AspNetCore.Builder;
using Microsoft.AspNetCore.Http;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.IdentityModel.Protocols.OpenIdConnect;
namespace Mvc.Client {
public class Startup {
public void ConfigureServices(IServiceCollection services) {
services.AddAuthentication(options => {
options.SignInScheme = CookieAuthenticationDefaults.AuthenticationScheme;
});
services.AddMvc();
}
public void Configure(IApplicationBuilder app) {
app.UseDeveloperExceptionPage();
app.UseStaticFiles();
// Insert a new cookies middleware in the pipeline to store the user
// identity after he has been redirected from the identity provider.
app.UseCookieAuthentication(new CookieAuthenticationOptions {
AutomaticAuthenticate = true,
AutomaticChallenge = true,
LoginPath = new PathString("/signin")
});
app.UseOpenIdConnectAuthentication(new OpenIdConnectOptions {
// Note: these settings must match the application details
// inserted in the database at the server level.
ClientId = "myClient",
ClientSecret = "secret_secret_secret",
PostLogoutRedirectUri = "http://localhost:53507/",
RequireHttpsMetadata = false,
GetClaimsFromUserInfoEndpoint = true,
SaveTokens = true,
// Use the authorization code flow.
ResponseType = OpenIdConnectResponseType.Code,
// Note: setting the Authority allows the OIDC client middleware to automatically
// retrieve the identity provider's configuration and spare you from setting
// the different endpoints URIs or the token validation parameters explicitly.
Authority = "http://localhost:54540/",
Scope = { "email", "roles", "offline_access" }
});
app.UseMvc();
}
}
}