ASP.NET Identity with multiple applications

前端 未结 3 942
猫巷女王i
猫巷女王i 2020-12-28 10:16

so our organization is developing some new web apps using asp.net mvc and web api. we decided to not use active directory for authentication/authorization purposes so it loo

相关标签:
3条回答
  • 2020-12-28 10:49

    Your users and their credentials are stored in AspNetUser table and Roles are in ASPNetRole while AspNetUserRole serves as junction table between the two to map users and roles. You can implement SSO (Single Sign On) by sharing these tables in your applications. Like each application will need to read these tables and roles and login users. But a better approach would be to create a central WebApi to handle user authentication and authorization.

    Also if you Roles can be changed at run time then you have idea of Permissions, You can create a custom Table for storing permissions and then map Roles to Permissions. And when user logs-in just load all his permissions and store as claims. You can either serialize whole Role (with its permission list) and Store it as one claim. Or store each permission as individual claim whichever suits you best.

    0 讨论(0)
  • 2020-12-28 10:52

    Take a look at this tutorial. It shows how to implement ASP.NET Identity using Web API:

    http://bitoftech.net/2015/01/21/asp-net-identity-2-with-asp-net-web-api-2-accounts-management/

    As for dealing with multiple applications. Two approaches that come to mind are:

    1. Append an AppId to all usernames
    2. Add an AppId column to AspNetUsers table, derive from UserStore and re-implement the Find based methods so the queries take into account the AppId

    For #1 when the application wants to create a new user it would send a request to the WebApi containing the new user information and an AppId. The WebApi would then concatenate the UserName and AppId to create the complete username that will be written to the database. So, if application 1234 wants to create a user with the username myuser, then the WebApi will create a new user with the username myuser_1234. From that point on when querying the database you would first take the UserName and AppId from the request, concatenate them and then query the database.

    If another application 9900 wants to create a myuser, then the final username written to the database would be myuser_9900.

    You may want to store the application details in the database and for every request validate the AppId to ensure that you recognise the application before processing its request.

    I've not thought much of step #2, so its just a suggestion.

    If you wanted to share the user credentials across multiple applications, then you could probably ignore the above, go with standard functionality and just have all applications point to the same database therefore allowing all applications to access all users regardless of which application created which user.

    UPDATE #1: In this instance bearer tokens could be used and I think (going from memory) the tutorial series mentioned above touches on this and how a single WebApi can provide tokens for multiple applications.

    0 讨论(0)
  • 2020-12-28 10:52

    For the single sign on it's possible sharing cookies or using a different session state such as <sessionState mode="SQLServer"> or <sessionState mode="StateServer"> https://msdn.microsoft.com/en-us/library/ms178586(v=vs.140).aspx

    0 讨论(0)
提交回复
热议问题