openid-connect

IdentityServer gets into infinite loop of authentication

对着背影说爱祢 提交于 2019-12-04 03:33:15
问题 I have the following client set up in IdentityServer: new Client { ClientName = "My web application", Enabled = true, ClientId = "mywebapp", ClientSecrets = new List<ClientSecret> { new ClientSecret("somesecret") }, Flow = Flows.Hybrid, ClientUri = "https://app.mydomain.com", RedirectUris = new List<string> { "oob://localhost/wpfclient", "http://localhost:2672/", "https://app.mydomain.com" } } And it is hosted online, let's say https://auth.mydomain.com/core . Trying to modify the MVC OWIN

OWIN OpenID connect authorization fails to authorize secured controller / actions

China☆狼群 提交于 2019-12-04 03:08:58
I am working on a project where a third party provider will act as an Oauth2 based Authorization Server. An Asp.net MVC 5 based client which will send the user to the authorization server to authenticate (using login / password) and the auth server will return an access token back to the MVC client. Any further calls to resource servers (APIs) will be made using the access token. To achieve this I am using Microsoft.Owin.Security.OpenIdConnect and the UseOpenIdConnectAuthentication extension. I am able to successfully redirect and get the access token from the auth server but the client is not

Logging Out With AspNet.Security.OpenIdConnect.Server (ASP.NET vNext)

◇◆丶佛笑我妖孽 提交于 2019-12-04 01:52:41
问题 I am using Visual Studio 2015 Enterprise and ASP.NET vNext Beta8 to issue and consume JWT tokens as described here. In our implementation we're storing some client details in Redis at token issuing time and we would like the flush this information when the user logs out. My question is what is the best practices for logging out with OIDC? While I could roll my own contoller for this purpose I couldn't help but notice Open ID Connect (OIDC) seems somewhat primed to handle this case. For

SecurityTokenSignatureKeyNotFoundException when validating JWT signature

拟墨画扇 提交于 2019-12-04 00:34:37
问题 I'm trying to implement the OpenID Connect specification for my organisation. I'm using Microsoft's OWIN implementation of OpenID Connect in a test relying party application to verify my implementation of the protocol. I've exposed the following metadata document: { "issuer": "https://acs.contoso.com/", "authorization_endpoint": "http://localhost:53615/oauth2/auth", "token_endpoint": "http://localhost:53615/oauth2/token", "userinfo_endpoint": "http://localhost:53615/connect/userinfo", "jwks

Overriding TokenEndPoint in AspNet.Security.OpenIdConnect.Server

a 夏天 提交于 2019-12-03 21:00:16
问题 question related to this post here: Configure the authorization server endpoint. Using the above example I am able to get token. previously it was possible to get additional information by over riding public override Task TokenEndpoint(OAuthTokenEndpointContext context) { foreach (KeyValuePair<string, string> property in context.Properties.Dictionary) { context.AdditionalResponseParameters.Add(property.Key, property.Value); } return Task.FromResult<object>(null); } how do you achieve that in

How can I set the Authority on OpenIdConnect middleware options dynamically?

梦想与她 提交于 2019-12-03 16:38:36
We have multiple tenants, and they use different authorities (their own, not just standard providers). While I know how to dynamically set the clientId and secret, I can't figure out how to set the authority. It is set once, during startup, and afterwards it cannot be changed (or so it seems). Since we have a lot of tenants we don't want to register all at startup, and we also don't want to require a restart when tenants are added. Any suggestions how I can go about this? I'd love to use the existing middleware, but if it's not possible I could write my own. Appreciate any suggestion! While a

Which well-known OpenID providers is a new site expected to support?

不羁岁月 提交于 2019-12-03 16:01:52
I plan to develop a web application that supports OpenID Connect as a relying party, so that a user of the application can sign up and log in using the identity provider of his choice. (This is the same tech that "My Logins" on each Stack Exchange site uses.) This application would be available for download and installation by server operators, much as WordPress, phpBB, and MediaWiki software are made available. With which OpenID Connect providers should a server operator expect to have to sign up manually? Back when OpenID 2.0 was the most common protocol version, most identity providers

openid connect - identifying tenant during login

落花浮王杯 提交于 2019-12-03 15:26:40
I have a multi-tenant (single database) application which allows for same username/email across different tenants. At the time of login (Implicit flow) how can I identify the tenant? I thought of following possibilities: At the time of registration ask the user for account slug (company/tenant slug) and during login user should provide the slug along with username and password . But there is no parameter in open id request to send the slug. Create an OAuth application at the time of registration and use slug as client_id . At the time of login pass slug in client_id , which I will use to fetch

OpenID Connect SSO in React-Redux app

霸气de小男生 提交于 2019-12-03 12:26:04
I'm trying to implement SSO on my React-Redux app using an OpenID-Connect provider. The intent is to protect all components and redirect the user to the Identity Provider's login page if the session ends. This is why I cannot have a dedicated Login page (component) in the application. I've read that saving JWTs in the localStorage could be a good idea so I was thinking of using a flag isAuthenticated in the Redux store and keep JWTs in the localStorage. I can then fetch the JWTs from the localStorage to authenticate other APIs I'd be calling from within my app. Is this approach appropriate?

OpenID Connect lightweight library

大城市里の小女人 提交于 2019-12-03 12:11:26
问题 I'm looking for OpenID Connect (OIDC) Relying Party lightweight library that will have these routines implemented. Compose "Authentication Request" Validate "id_token" signature (including downloading certificate from metadata endpoint) Parse "id_token" JWT The only OIDC flow to be supported is so called " implicit flow " where server answers with "id_token" (and "access_token" if requested) right from authorization endpoint (spec link). Searching over NuGet repository seems to yield the only