claims

OpenID Connect: How to add custom claims data in the client credential flow

此生再无相见时 提交于 2020-06-16 09:44:08
问题 I'm setting up a client credential flow with my identity server to get an access token from a client. I'm able to get the access token with the following code, Identity server configuration: public void Configuration(IAppBuilder app) { app.Map("/identity", idsrvApp => { var corsPolicyService = new DefaultCorsPolicyService() { AllowAll = true }; var idServerServiceFactory = new IdentityServerServiceFactory() .UseInMemoryClients(Clients.Get()) .UseInMemoryScopes(Scopes.Get()) .UseInMemoryUsers

OpenID Connect: How to add custom claims data in the client credential flow

隐身守侯 提交于 2020-06-16 09:43:46
问题 I'm setting up a client credential flow with my identity server to get an access token from a client. I'm able to get the access token with the following code, Identity server configuration: public void Configuration(IAppBuilder app) { app.Map("/identity", idsrvApp => { var corsPolicyService = new DefaultCorsPolicyService() { AllowAll = true }; var idServerServiceFactory = new IdentityServerServiceFactory() .UseInMemoryClients(Clients.Get()) .UseInMemoryScopes(Scopes.Get()) .UseInMemoryUsers

How to prevent two volume claims to claim the same volume on Kubernetes?

情到浓时终转凉″ 提交于 2020-05-13 08:09:04
问题 On my Kubernetes cluster on GKE, I have the following persistent volume claims (PVCs): kind: PersistentVolumeClaim apiVersion: v1 metadata: name: registry spec: accessModes: - ReadWriteOnce resources: requests: storage: 100Gi and: kind: PersistentVolumeClaim apiVersion: v1 metadata: name: postgresql-blobs spec: accessModes: - ReadWriteOnce resources: requests: storage: 100Gi Amongst others, I have the following persistent volume defined: kind: PersistentVolume apiVersion: v1 metadata: name:

Is it possible to get Azure AD B2C to include the aud in calls to custom claims REST API?

血红的双手。 提交于 2020-02-04 01:20:08
问题 I setup my Azure AD B2C custom claims REST API as described at https://docs.microsoft.com/en-us/azure/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw and that works as described. I'd like to use the same API for multiple applications rather than building one API endpoint for each app (and having to replicate most of the XML configuration). Is it possible to get Azure B2C to include the aud value when it hits the API so I can provide the claims that apply to the app asking for

Restricting ADFS 2.0 to use a specific OU instead of Domain level access

走远了吗. 提交于 2020-01-13 17:59:21
问题 Consider the below Sample Scenario: I have a Single Active Directory Domain for Production, Test and for development (each separated at OU level). I want to install ADFS at test OU level and I do not want users authenticated at test OU ADFS to have access (both read and write) to other OU's. Can this be possible ? Can we restrict ADFS 2.0 to work only under a particular OU ? 回答1: Though restricting ADFS 2.0 to work under a specific OU is not feasible (from the resources I read and IMHO), we

web.config convert saml security token to claim principal

旧街凉风 提交于 2020-01-03 04:51:10
问题 I have problem to validate the security token, i tried to use your code and other too, but when it try to validate ST I have thi error: ID4175: The issuer of the security token was not recognized by the IssuerNameRegistry. To accept security tokens from this issuer, configure the IssuerNameRegistry to return a valid name for this issuer i don't know hot confire the web config, can you help me? this is the code: //Microsoft.IdentityModel.Configuration.ServiceConfiguration serviceConfig = new

ASP.NET Identity doesn't load any claims

冷暖自知 提交于 2020-01-03 04:38:11
问题 I have a ASP MVC 5 site using the new identity framework with 3rd party authentication using entity framework as it comes out of the box. I have a logged in user and they have 3 claims (the standard name nameidentifier and authentication provider that seem to be provided by the default ClaimsIdentityFactory). When a user performs some operation I then add a claim for them using this: userManager.AddClaim(userId, new Claim(claimType,claimValue)); If I look in the db in the AspNetUserClaims

Reuse Claim in regenerateIdentityCallback in Owin Identity in MVC5

自古美人都是妖i 提交于 2020-01-01 08:43:08
问题 I am using MVC5 with Owin identity. I am struggling to reuse any custom Claims in regenerateIdentityCallback. I have in Startup this configuration (as provided in the standard Template for new MVC project) app.UseCookieAuthentication(new CookieAuthenticationOptions { AuthenticationType = DefaultAuthenticationTypes.ApplicationCookie, LoginPath = new PathString("/Account/Login"), Provider = new CookieAuthenticationProvider { OnValidateIdentity = SecurityStampValidator.OnValidateIdentity

ASP.NET Identity: Update external claims after authorization

主宰稳场 提交于 2020-01-01 02:30:06
问题 I am using ASP.NET Identity with several external login providers and I need to handle the following scenario: 1) A user logs in using an external service (let's say it is Facebook), application grabs some info from Facebook (first and last name, email, date of birth, etc...) Claims containing this info are added to the identity. 2) I need to store this info in the application Db, for the following scenarios: Admin browses the list of registered users Email subscription service will use first

Change from Roles authorization to Claims authorization

允我心安 提交于 2019-12-31 05:06:59
问题 I have a webforms application which was built with ASP.NET Membership. I migrated to Identities successfully. I now want to use Claims authorization instead of Roles authorization, but the Role information for the old users has been migrated to the AspNetUserRoles table in the database but the AspNetUserClaims table is empty. New users registered after migration, I can add to AspNetUserClaims with the following code: IdentityResult result1 = manager.AddClaim(user.Id, new Claim(ClaimTypes.Role