Externl Login
parent
19a3ba6f87
commit
984b76b170
@ -0,0 +1,33 @@
|
|||||||
|
namespace Yavsc.Models.Auth
|
||||||
|
{
|
||||||
|
using Microsoft.AspNetCore.Identity;
|
||||||
|
using System.ComponentModel.DataAnnotations.Schema;
|
||||||
|
|
||||||
|
public class YaIdentityUserLogin
|
||||||
|
{
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Gets or sets the login provider for the login (e.g. facebook, google)
|
||||||
|
/// </summary>
|
||||||
|
public virtual string LoginProvider { get; set; } = default!;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Gets or sets the unique provider identifier for this login.
|
||||||
|
/// </summary>
|
||||||
|
public virtual string ProviderKey { get; set; } = default!;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Gets or sets the friendly name used in a UI for this login.
|
||||||
|
/// </summary>
|
||||||
|
public virtual string? ProviderDisplayName { get; set; }
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Gets or sets the primary key of the user associated with this login.
|
||||||
|
/// </summary>
|
||||||
|
public String UserId { get; set; } = default!;
|
||||||
|
|
||||||
|
[ForeignKey("UserId")]
|
||||||
|
public virtual ApplicationUser User { get; set; }
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -0,0 +1,228 @@
|
|||||||
|
/*
|
||||||
|
Copyright (c) 2024 HigginsSoft, Alexander Higgins - https://github.com/alexhiggins732/
|
||||||
|
|
||||||
|
Copyright (c) 2018, Brock Allen & Dominick Baier. All rights reserved.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0. See LICENSE in the project root for license information.
|
||||||
|
Source code and license this software can be found
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in all
|
||||||
|
copies or substantial portions of the Software.
|
||||||
|
*/
|
||||||
|
|
||||||
|
using System.Security.Claims;
|
||||||
|
using IdentityModel;
|
||||||
|
using IdentityServer8;
|
||||||
|
using IdentityServer8.Events;
|
||||||
|
using IdentityServer8.Services;
|
||||||
|
using IdentityServer8.Stores;
|
||||||
|
using Microsoft.AspNetCore.Authentication;
|
||||||
|
using Microsoft.AspNetCore.Authorization;
|
||||||
|
using Microsoft.AspNetCore.Identity;
|
||||||
|
using Microsoft.AspNetCore.Mvc;
|
||||||
|
using Microsoft.EntityFrameworkCore;
|
||||||
|
using Yavsc;
|
||||||
|
using Yavsc.Extensions;
|
||||||
|
using Yavsc.Interfaces;
|
||||||
|
using Yavsc.Models;
|
||||||
|
|
||||||
|
namespace IdentityServerHost.Quickstart.UI;
|
||||||
|
|
||||||
|
[SecurityHeaders]
|
||||||
|
[AllowAnonymous]
|
||||||
|
public class ExternalController : Controller
|
||||||
|
{
|
||||||
|
private readonly IIdentityServerInteractionService _interaction;
|
||||||
|
private readonly IClientStore _clientStore;
|
||||||
|
private readonly ILogger<ExternalController> _logger;
|
||||||
|
private readonly IEventService _events;
|
||||||
|
private IExternalIdentityManager _users;
|
||||||
|
|
||||||
|
private readonly SignInManager<ApplicationUser> _signInManager;
|
||||||
|
private readonly RoleManager<IdentityRole> _roleManager;
|
||||||
|
private readonly ApplicationDbContext _dbContext;
|
||||||
|
|
||||||
|
public ExternalController(
|
||||||
|
IIdentityServerInteractionService interaction,
|
||||||
|
IClientStore clientStore,
|
||||||
|
IEventService events,
|
||||||
|
ILogger<ExternalController> logger,
|
||||||
|
IExternalIdentityManager externalIdentityProviderManager,
|
||||||
|
SignInManager<ApplicationUser> signInManager,
|
||||||
|
ApplicationDbContext dbContext,
|
||||||
|
RoleManager<IdentityRole> roleManager
|
||||||
|
)
|
||||||
|
{
|
||||||
|
// if the TestUserStore is not in DI, then we'll just use the global users collection
|
||||||
|
// this is where you would plug in your own custom identity management library (e.g. ASP.NET Identity)
|
||||||
|
_users = externalIdentityProviderManager;
|
||||||
|
_interaction = interaction;
|
||||||
|
_clientStore = clientStore;
|
||||||
|
_logger = logger;
|
||||||
|
_events = events;
|
||||||
|
_signInManager = signInManager;
|
||||||
|
_roleManager = roleManager;
|
||||||
|
_dbContext = dbContext;
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// initiate roundtrip to external authentication provider
|
||||||
|
/// </summary>
|
||||||
|
[HttpGet]
|
||||||
|
public IActionResult Challenge(string scheme, string returnUrl)
|
||||||
|
{
|
||||||
|
if (string.IsNullOrEmpty(returnUrl)) returnUrl = "~/";
|
||||||
|
|
||||||
|
// validate returnUrl - either it is a valid OIDC URL or back to a local page
|
||||||
|
if (Url.IsLocalUrl(returnUrl) == false && _interaction.IsValidReturnUrl(returnUrl) == false)
|
||||||
|
{
|
||||||
|
// user might have clicked on a malicious link - should be logged
|
||||||
|
throw new Exception("invalid return URL");
|
||||||
|
}
|
||||||
|
|
||||||
|
// start challenge and roundtrip the return URL and scheme
|
||||||
|
var props = new AuthenticationProperties
|
||||||
|
{
|
||||||
|
RedirectUri = Url.Action(nameof(Callback)),
|
||||||
|
Items =
|
||||||
|
{
|
||||||
|
{ "returnUrl", returnUrl },
|
||||||
|
{ "scheme", scheme },
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
return Challenge(props, scheme);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Post processing of external authentication
|
||||||
|
/// </summary>
|
||||||
|
[HttpGet]
|
||||||
|
public async Task<IActionResult> Callback()
|
||||||
|
{
|
||||||
|
// read external identity from the temporary cookie
|
||||||
|
var result = await HttpContext.AuthenticateAsync(IdentityServerConstants.ExternalCookieAuthenticationScheme);
|
||||||
|
if (result?.Succeeded != true)
|
||||||
|
{
|
||||||
|
throw new Exception("External authentication error");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (_logger.IsEnabled(LogLevel.Debug))
|
||||||
|
{
|
||||||
|
var externalClaims = result.Principal.Claims.Select(c => $"{c.Type}: {c.Value}");
|
||||||
|
_logger.LogDebug("External claims: {@claims}", externalClaims);
|
||||||
|
}
|
||||||
|
|
||||||
|
// lookup our user and external provider info
|
||||||
|
var (user, provider, providerUserId, claims) = await FindUserFromExternalProvider(result);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
// this might be where you might initiate a custom workflow for user registration
|
||||||
|
// in this sample we don't show how that would be done, as our sample implementation
|
||||||
|
// simply auto-provisions new external user
|
||||||
|
user = AutoProvisionUser(provider, providerUserId, claims);
|
||||||
|
}
|
||||||
|
|
||||||
|
// this allows us to collect any additional claims or properties
|
||||||
|
// for the specific protocols used and store them in the local auth cookie.
|
||||||
|
// this is typically used to store data needed for signout from those protocols.
|
||||||
|
var additionalLocalClaims = new List<Claim>();
|
||||||
|
var localSignInProps = new AuthenticationProperties();
|
||||||
|
ProcessLoginCallback(result, additionalLocalClaims, localSignInProps);
|
||||||
|
|
||||||
|
// issue authentication cookie for user
|
||||||
|
var isuser = new IdentityServerUser(user.Id)
|
||||||
|
{
|
||||||
|
DisplayName = user.UserName,
|
||||||
|
IdentityProvider = provider,
|
||||||
|
AdditionalClaims = additionalLocalClaims
|
||||||
|
};
|
||||||
|
await HttpContext.SignInAsync(isuser, localSignInProps);
|
||||||
|
//await HttpContext.SignInAsync(user, _roleManager, false, _dbContext);
|
||||||
|
|
||||||
|
// delete temporary cookie used during external authentication
|
||||||
|
await HttpContext.SignOutAsync(IdentityServerConstants.ExternalCookieAuthenticationScheme);
|
||||||
|
// retrieve return URL
|
||||||
|
var returnUrl = result.Properties.Items["returnUrl"] ?? "~/";
|
||||||
|
|
||||||
|
// check if external login is in the context of an OIDC request
|
||||||
|
var context = await _interaction.GetAuthorizationContextAsync(returnUrl);
|
||||||
|
await _events.RaiseAsync(new UserLoginSuccessEvent(provider, providerUserId, user.Id, user.UserName, true, context?.Client.ClientId));
|
||||||
|
|
||||||
|
if (context != null)
|
||||||
|
{
|
||||||
|
if (context.IsNativeClient())
|
||||||
|
{
|
||||||
|
// The client is native, so this change in how to
|
||||||
|
// return the response is for better UX for the end user.
|
||||||
|
return this.LoadingPage("Redirect", returnUrl);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
return Redirect(returnUrl);
|
||||||
|
}
|
||||||
|
|
||||||
|
private async Task<(ApplicationUser user,
|
||||||
|
string provider,
|
||||||
|
string providerUserId,
|
||||||
|
IEnumerable<Claim> claims)>
|
||||||
|
FindUserFromExternalProvider(AuthenticateResult result)
|
||||||
|
{
|
||||||
|
var externalUser = result.Principal;
|
||||||
|
|
||||||
|
// try to determine the unique id of the external user (issued by the provider)
|
||||||
|
// the most common claim type for that are the sub claim and the NameIdentifier
|
||||||
|
// depending on the external provider, some other claim type might be used
|
||||||
|
var userIdClaim = externalUser.FindFirst(JwtClaimTypes.Subject) ??
|
||||||
|
externalUser.FindFirst(ClaimTypes.NameIdentifier) ??
|
||||||
|
throw new Exception("Unknown userid");
|
||||||
|
|
||||||
|
// remove the user id claim so we don't include it as an extra claim if/when we provision the user
|
||||||
|
var claims = externalUser.Claims.ToList();
|
||||||
|
claims.Remove(userIdClaim);
|
||||||
|
|
||||||
|
var provider = result.Properties.Items["scheme"];
|
||||||
|
var providerUserId = userIdClaim.Value;
|
||||||
|
|
||||||
|
// find external user
|
||||||
|
|
||||||
|
ApplicationUser? user = await _users.FindByExternaleProviderAsync (provider, providerUserId);
|
||||||
|
|
||||||
|
return (user, provider, providerUserId, claims);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Register a new user by external id
|
||||||
|
/// </summary>
|
||||||
|
/// <param name="provider"></param>
|
||||||
|
/// <param name="providerUserId"></param>
|
||||||
|
/// <param name="claims"></param>
|
||||||
|
/// <returns></returns>
|
||||||
|
private ApplicationUser AutoProvisionUser(string provider, string providerUserId, IEnumerable<Claim> claims)
|
||||||
|
{
|
||||||
|
var user = _users.AutoProvisionUser(provider, providerUserId, claims.ToList());
|
||||||
|
return user;
|
||||||
|
}
|
||||||
|
|
||||||
|
// if the external login is OIDC-based, there are certain things we need to preserve to make logout work
|
||||||
|
// this will be different for WS-Fed, SAML2p or other protocols
|
||||||
|
private void ProcessLoginCallback(AuthenticateResult externalResult, List<Claim> localClaims, AuthenticationProperties localSignInProps)
|
||||||
|
{
|
||||||
|
// if the external system sent a session id claim, copy it over
|
||||||
|
// so we can use it for single sign-out
|
||||||
|
var sid = externalResult.Principal.Claims.FirstOrDefault(x => x.Type == JwtClaimTypes.SessionId);
|
||||||
|
if (sid != null)
|
||||||
|
{
|
||||||
|
localClaims.Add(new Claim(JwtClaimTypes.SessionId, sid.Value));
|
||||||
|
}
|
||||||
|
|
||||||
|
// if the external provider issued an id_token, we'll keep it for signout
|
||||||
|
var idToken = externalResult.Properties.GetTokenValue("id_token");
|
||||||
|
if (idToken != null)
|
||||||
|
{
|
||||||
|
localSignInProps.StoreTokens(new[] { new AuthenticationToken { Name = "id_token", Value = idToken } });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -0,0 +1,22 @@
|
|||||||
|
/*
|
||||||
|
Copyright (c) 2024 HigginsSoft, Alexander Higgins - https://github.com/alexhiggins732/
|
||||||
|
|
||||||
|
Copyright (c) 2018, Brock Allen & Dominick Baier. All rights reserved.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0. See LICENSE in the project root for license information.
|
||||||
|
Source code and license this software can be found
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in all
|
||||||
|
copies or substantial portions of the Software.
|
||||||
|
*/
|
||||||
|
|
||||||
|
using System.Security.Claims;
|
||||||
|
using Yavsc.Models;
|
||||||
|
|
||||||
|
namespace Yavsc.Interfaces;
|
||||||
|
|
||||||
|
public interface IExternalIdentityManager
|
||||||
|
{
|
||||||
|
ApplicationUser AutoProvisionUser(string provider, string providerUserId, List<Claim> claims);
|
||||||
|
Task<ApplicationUser?> FindByExternaleProviderAsync(string provider, string providerUserId);
|
||||||
|
}
|
||||||
@ -0,0 +1,28 @@
|
|||||||
|
using System.Security.Claims;
|
||||||
|
using Microsoft.EntityFrameworkCore;
|
||||||
|
using Yavsc.Interfaces;
|
||||||
|
using Yavsc.Models;
|
||||||
|
|
||||||
|
public class ExternalIdentityManager : IExternalIdentityManager
|
||||||
|
{
|
||||||
|
private ApplicationDbContext _applicationDbContext;
|
||||||
|
|
||||||
|
public ExternalIdentityManager(ApplicationDbContext applicationDbContext)
|
||||||
|
{
|
||||||
|
_applicationDbContext = applicationDbContext;
|
||||||
|
}
|
||||||
|
public ApplicationUser AutoProvisionUser(string provider, string providerUserId, List<Claim> claims)
|
||||||
|
{
|
||||||
|
throw new NotImplementedException();
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task<ApplicationUser?> FindByExternaleProviderAsync(string provider, string providerUserId)
|
||||||
|
{
|
||||||
|
var user = await _applicationDbContext.AspNetUserLogins
|
||||||
|
.FirstOrDefaultAsync(
|
||||||
|
i => (i.LoginProvider == provider) && (i.ProviderKey == providerUserId)
|
||||||
|
);
|
||||||
|
if (user == null) return null;
|
||||||
|
return await _applicationDbContext.Users.FirstOrDefaultAsync(u=>u.Id == user.UserId);
|
||||||
|
}
|
||||||
|
}
|
||||||
Loading…
Reference in New Issue