Markdown to Kramdown tweaking

This commit is contained in:
Martin Danielsson 2016-04-13 15:28:25 +02:00
parent 043174cfd9
commit 1de0268dfd

View file

@ -1,4 +1,4 @@
****--- ---
layout: post layout: post
title: How to use an On-Premise Identity Server in ASP.NET title: How to use an On-Premise Identity Server in ASP.NET
subtitle: Log in to an ASP.NET application with AFDS identity and check membership in specific groups subtitle: Log in to an ASP.NET application with AFDS identity and check membership in specific groups
@ -22,28 +22,28 @@ This article shows you how to develop an ASP.NET application to:
Create a new ASP.NET Web Application, for example: Create a new ASP.NET Web Application, for example:
{:.center} {:.center}
![]({{ site.url }}/images/adfs-identity/pic26.jpg){:style="margin:auto"} ![]( /images/adfs-identity/pic26.jpg){:style="margin:auto"}
On the next page, select MVC, then click on "Change Authentication": On the next page, select MVC, then click on "Change Authentication":
{:.center} {:.center}
![]({{ site.url }}/images/adfs-identity/pic27.jpg){:style="margin:auto"} ![]( /images/adfs-identity/pic27.jpg){:style="margin:auto"}
You will be sent to this dialog: You will be sent to this dialog:
{:.center} {:.center}
![]({{ site.url }}/images/adfs-identity/pic28.jpg){:style="margin:auto"} ![]( /images/adfs-identity/pic28.jpg){:style="margin:auto"}
- Select **Work and School Accounts** - Select **Work and School Accounts**
- Select **On-Premises** - Select **On-Premises**
- For the **On-Premises Authority**, ask IT for the public URL of your FederationMetadata.xml on the identity server, e.g. - For the **On-Premises Authority**, ask IT for the public URL of your FederationMetadata.xml on the identity server, e.g.
https://xxxxxxxxxx.com/FederationMetadata/2007-06/FederationMetadata.xml `https://xxxxxxxxxx.com/FederationMetadata/2007-06/FederationMetadata.xml`
- For the **App ID URI**, you must enter an identifier for your app. This is not a real URL address, just a unique identifier, for example http://haufe/mvcwithadfs. - For the **App ID URI**, you must enter an identifier for your app. This is not a real URL address, just a unique identifier, for example `http://haufe/mvcwithadfs`.
**Important:** The **App ID URI** identifies your app with the on-premise ADFS identity server. This same App ID must be registered on the ADFS identity server by IT as a **Relying Party Trust** identifier (sometimes known as **Realm**), so that the server will accept requests. **Important:** The **App ID URI** identifies your app with the on-premise ADFS identity server. This same App ID must be registered on the ADFS identity server by IT as a **Relying Party Trust** identifier (sometimes known as **Realm**), so that the server will accept requests.
@ -54,7 +54,7 @@ Finish up the project creation process.
Make sure that the project is set to run as HTTPS: Make sure that the project is set to run as HTTPS:
{:.center} {:.center}
![]({{ site.url }}/images/adfs-identity/pic29.jpg){:style="margin:auto"} ![]( /images/adfs-identity/pic29.jpg){:style="margin:auto"}
Compile the project. Compile the project.
@ -64,30 +64,32 @@ If you are wondering where all of the authentication code resides (or if you nee
The App ID URI and the On-Premises Authority URL are stored in the <appSettings> node of web.config: The App ID URI and the On-Premises Authority URL are stored in the <appSettings> node of web.config:
<add key="ida:ADFSMetadata" value="https://xxxxxxxxxx.com/FederationMetadata/2007-06/FederationMetadata.xml" /> ~~~xml
<add key="ida:Wtrealm" value="http://haufe/mvcwithadfs" /> <add key="ida:ADFSMetadata" value="https://xxxxxxxxxx.com/FederationMetadata/2007-06/FederationMetadata.xml" />
<add key="ida:Wtrealm" value="http://haufe/mvcwithadfs" />
~~~
And the OWIN-Code to specify the on-premise authentication is in Startup.Auth.cs: And the OWIN-Code to specify the on-premise authentication is in `Startup.Auth.cs`:
``` csharp ~~~csharp
public partial class Startup public partial class Startup
{ {
private static string realm = ConfigurationManager.AppSettings["ida:Wtrealm"]; private static string realm = ConfigurationManager.AppSettings["ida:Wtrealm"];
private static string adfsMetadata = ConfigurationManager.AppSettings["ida:ADFSMetadata"]; private static string adfsMetadata = ConfigurationManager.AppSettings["ida:ADFSMetadata"];
public void ConfigureAuth(IAppBuilder app) public void ConfigureAuth(IAppBuilder app)
{ {
app.SetDefaultSignInAsAuthenticationType(CookieAuthenticationDefaults.AuthenticationType); app.SetDefaultSignInAsAuthenticationType(CookieAuthenticationDefaults.AuthenticationType);
app.UseCookieAuthentication(new CookieAuthenticationOptions()); app.UseCookieAuthentication(new CookieAuthenticationOptions());
app.UseWsFederationAuthentication( app.UseWsFederationAuthentication(
new WsFederationAuthenticationOptions new WsFederationAuthenticationOptions
{ {
Wtrealm = realm, Wtrealm = realm,
MetadataAddress = adfsMetadata MetadataAddress = adfsMetadata
}); });
} }
} }
``` ~~~
# Configure the On-Premise Identity Server (Job for IT) # # Configure the On-Premise Identity Server (Job for IT) #
@ -97,18 +99,18 @@ On the identity server, these are the critical configuration pages for a new **R
## Identifiers ## ## Identifiers ##
{:.center} {:.center}
![]({{ site.url }}/images/adfs-identity/pic31.jpg){:style="margin:auto"} ![]( /images/adfs-identity/pic31.jpg){:style="margin:auto"}
**Display Name:** This is the name under which IT sees the **Relying Party Trust**. **Display Name:** This is the name under which IT sees the **Relying Party Trust**.
**Relying Party identifiers:** This is a list of relying party identifiers, known on "our" ASP.NET side as **App ID URI**. The only important one is the **App ID URI** we assigned to our app when creating it. On this screen, you also see https://localhost:44306. This was automatically set by the Relying Party Trust Wizard when it asked for the first endpoint, since it assumed that the endpoint is also a default identifier. But since we specified a custom **App ID URI** (which gets transmitted by the user's browser), the http://haufe/mvcwithadfs entry is the only one which really matters. **Relying Party identifiers:** This is a list of relying party identifiers, known on "our" ASP.NET side as **App ID URI**. The only important one is the **App ID URI** we assigned to our app when creating it. On this screen, you also see `https://localhost:44306`. This was automatically set by the Relying Party Trust Wizard when it asked for the first endpoint, since it assumed that the endpoint is also a default identifier. But since we specified a custom **App ID URI** (which gets transmitted by the user's browser), the `http://haufe/mvcwithadfs` entry is the only one which really matters.
## Endpoints ## ## Endpoints ##
This is the page which lists all browser source endpoints which are to be considered valid by the identity server. Here you see the entry which comes into play while we are debugging locally. Once your application has been uploaded to server, e.g. Azure, you must add the new endpoint e.g.: This is the page which lists all browser source endpoints which are to be considered valid by the identity server. Here you see the entry which comes into play while we are debugging locally. Once your application has been uploaded to server, e.g. Azure, you must add the new endpoint e.g.:
https://xxxxxxxxxx.azurewebsites.net/ `https://xxxxxxxxxx.azurewebsites.net/`
(not shown in the screen shot) (not shown in the screen shot)
@ -117,7 +119,7 @@ https://xxxxxxxxxx.azurewebsites.net/
**Issuance Authorization Rules** **Issuance Authorization Rules**
{:.center} {:.center}
![]({{ site.url }}/images/adfs-identity/pic32.jpg){:style="margin:auto"} ![]( /images/adfs-identity/pic32.jpg){:style="margin:auto"}
**Issuance Transform Rules** **Issuance Transform Rules**
@ -126,12 +128,12 @@ This is where we define which identity claims will go out to the requesting appl
Add a rule named e.g. **AD2OutgoingClaims** Add a rule named e.g. **AD2OutgoingClaims**
{:.center} {:.center}
![]({{ site.url }}/images/adfs-identity/pic33.jpg){:style="margin:auto"} ![]( /images/adfs-identity/pic33.jpg){:style="margin:auto"}
and edit it like this: and edit it like this:
{:.center} {:.center}
![]({{ site.url }}/images/adfs-identity/pic34.jpg){:style="margin:auto"} ![]( /images/adfs-identity/pic34.jpg){:style="margin:auto"}
The last line is the special one (the others being fairly standard). The last line causes AD to export every group that the user belongs to as a role, which can then be queried on the application side. The last line is the special one (the others being fairly standard). The last line causes AD to export every group that the user belongs to as a role, which can then be queried on the application side.
@ -147,12 +149,12 @@ Because we have configured the outgoing claims to include a role for every group
You may create a controller with the Authorize attribute like this: You may create a controller with the Authorize attribute like this:
``` csharp ~~~csharp
[Authorize] [Authorize]
public class RoleController : Controller public class RoleController : Controller
{ {
} }
``` ~~~
The **Authorize** attribute forces the user to be logged in before any requests are routed to this controller. The log in dialog will be opened automatically if necessary. The **Authorize** attribute forces the user to be logged in before any requests are routed to this controller. The log in dialog will be opened automatically if necessary.
@ -160,38 +162,38 @@ It is also possible to use the **Authorize** attribute not on the entire control
Once inside a controller (or method) requiring authorization, you have access to the security Information of the user. In particular, you can check membership in a given role (group) like this: Once inside a controller (or method) requiring authorization, you have access to the security Information of the user. In particular, you can check membership in a given role (group) like this:
``` csharp ~~~csharp
if (User.IsInRole("_Architects") if (User.IsInRole("_Architects")
{ {
// do something // do something
} }
else else
{ {
// do something else // do something else
} }
``` ~~~
Within a cshtml file, you may also want to react to user membership in a certain role. One way to do this is to bind the cshtml file to a model class which contains the necessary boolean flags. Set those flags in the controller, e.g.: Within a `cshtml` file, you may also want to react to user membership in a certain role. One way to do this is to bind the cshtml file to a model class which contains the necessary boolean flags. Set those flags in the controller, e.g.:
``` csharp ~~~csharp
model.IsArchitect = User.IsInRole("_Architects"); model.IsArchitect = User.IsInRole("_Architects");
``` ~~~
Pass the model instance to the view, then evaluate those flags in the cshtml file: Pass the model instance to the view, then evaluate those flags in the cshtml file:
``` csharp ~~~csharp
@if (Model.IsArchitect) @if (Model.IsArchitect)
{ {
<div style="color:#00ff00"> <div style="color:#00ff00">
<text><b>Yes, you are in the Architect group.</b></text> <text><b>Yes, you are in the Architect group.</b></text>
</div> </div>
} }
else else
{ {
<div style="color:#ff0000"> <div style="color:#ff0000">
<text><b>No, you are not in the Architect group.</b></text> <text><b>No, you are not in the Architect group.</b></text>
</div> </div>
} }
``` ~~~
Instead of using flags within the data binding model, it may be easier to have the controller just assign a property to the ViewBag and evaluate the ViewBag in the cshtml file. Instead of using flags within the data binding model, it may be easier to have the controller just assign a property to the ViewBag and evaluate the ViewBag in the cshtml file.