You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
67 lines
2.4 KiB
67 lines
2.4 KiB
using System.Net.Http;
|
|
using Microsoft.AspNetCore.Authentication.Cookies;
|
|
using Microsoft.AspNetCore.Authentication.OpenIdConnect;
|
|
using Microsoft.AspNetCore.Builder;
|
|
using Microsoft.AspNetCore.Http;
|
|
using Microsoft.Extensions.DependencyInjection;
|
|
using Microsoft.IdentityModel.Protocols.OpenIdConnect;
|
|
|
|
namespace Mvc.Client
|
|
{
|
|
public class Startup
|
|
{
|
|
public void ConfigureServices(IServiceCollection services)
|
|
{
|
|
services.AddAuthentication(options =>
|
|
{
|
|
options.SignInScheme = CookieAuthenticationDefaults.AuthenticationScheme;
|
|
});
|
|
|
|
services.AddMvc();
|
|
|
|
services.AddSingleton<HttpClient>();
|
|
}
|
|
|
|
public void Configure(IApplicationBuilder app)
|
|
{
|
|
app.UseDeveloperExceptionPage();
|
|
|
|
app.UseStaticFiles();
|
|
|
|
// Insert a new cookies middleware in the pipeline to store the user
|
|
// identity after he has been redirected from the identity provider.
|
|
app.UseCookieAuthentication(new CookieAuthenticationOptions
|
|
{
|
|
AutomaticAuthenticate = true,
|
|
AutomaticChallenge = true,
|
|
LoginPath = new PathString("/signin")
|
|
});
|
|
|
|
app.UseOpenIdConnectAuthentication(new OpenIdConnectOptions
|
|
{
|
|
// Note: these settings must match the application details
|
|
// inserted in the database at the server level.
|
|
ClientId = "mvc",
|
|
ClientSecret = "901564A5-E7FE-42CB-B10D-61EF6A8F3654",
|
|
PostLogoutRedirectUri = "http://localhost:53507/",
|
|
|
|
RequireHttpsMetadata = false,
|
|
GetClaimsFromUserInfoEndpoint = true,
|
|
SaveTokens = true,
|
|
|
|
// Use the authorization code flow.
|
|
ResponseType = OpenIdConnectResponseType.Code,
|
|
AuthenticationMethod = OpenIdConnectRedirectBehavior.RedirectGet,
|
|
|
|
// Note: setting the Authority allows the OIDC client middleware to automatically
|
|
// retrieve the identity provider's configuration and spare you from setting
|
|
// the different endpoints URIs or the token validation parameters explicitly.
|
|
Authority = "http://localhost:54540/",
|
|
|
|
Scope = { "email", "roles", "offline_access" }
|
|
});
|
|
|
|
app.UseMvc();
|
|
}
|
|
}
|
|
}
|