commit
87d434e869
|
@ -1,4 +1,4 @@
|
|||
****---
|
||||
---
|
||||
layout: post
|
||||
title: How to use an On-Premise Identity Server in ASP.NET
|
||||
subtitle: Log in to an ASP.NET application with AFDS identity and check membership in specific groups
|
||||
|
@ -22,28 +22,28 @@ This article shows you how to develop an ASP.NET application to:
|
|||
Create a new ASP.NET Web Application, for example:
|
||||
|
||||
{:.center}
|
||||
![]({{ site.url }}/images/adfs-identity/pic26.jpg){:style="margin:auto"}
|
||||
![]( /images/adfs-identity/pic26.jpg){:style="margin:auto"}
|
||||
|
||||
|
||||
On the next page, select MVC, then click on "Change Authentication":
|
||||
|
||||
{:.center}
|
||||
![]({{ site.url }}/images/adfs-identity/pic27.jpg){:style="margin:auto"}
|
||||
![]( /images/adfs-identity/pic27.jpg){:style="margin:auto"}
|
||||
|
||||
|
||||
You will be sent to this dialog:
|
||||
|
||||
{:.center}
|
||||
![]({{ site.url }}/images/adfs-identity/pic28.jpg){:style="margin:auto"}
|
||||
![]( /images/adfs-identity/pic28.jpg){:style="margin:auto"}
|
||||
|
||||
|
||||
- Select **Work and School Accounts**
|
||||
- Select **On-Premises**
|
||||
- For the **On-Premises Authority**, ask IT for the public URL of your FederationMetadata.xml on the identity server, e.g.
|
||||
|
||||
https://xxxxxxxxxx.com/FederationMetadata/2007-06/FederationMetadata.xml
|
||||
`https://xxxxxxxxxx.com/FederationMetadata/2007-06/FederationMetadata.xml`
|
||||
|
||||
- For the **App ID URI**, you must enter an identifier for your app. This is not a real URL address, just a unique identifier, for example http://haufe/mvcwithadfs.
|
||||
- For the **App ID URI**, you must enter an identifier for your app. This is not a real URL address, just a unique identifier, for example `http://haufe/mvcwithadfs`.
|
||||
|
||||
**Important:** The **App ID URI** identifies your app with the on-premise ADFS identity server. This same App ID must be registered on the ADFS identity server by IT as a **Relying Party Trust** identifier (sometimes known as **Realm**), so that the server will accept requests.
|
||||
|
||||
|
@ -54,7 +54,7 @@ Finish up the project creation process.
|
|||
Make sure that the project is set to run as HTTPS:
|
||||
|
||||
{:.center}
|
||||
![]({{ site.url }}/images/adfs-identity/pic29.jpg){:style="margin:auto"}
|
||||
![]( /images/adfs-identity/pic29.jpg){:style="margin:auto"}
|
||||
|
||||
Compile the project.
|
||||
|
||||
|
@ -64,14 +64,16 @@ If you are wondering where all of the authentication code resides (or if you nee
|
|||
|
||||
The App ID URI and the On-Premises Authority URL are stored in the <appSettings> node of web.config:
|
||||
|
||||
<add key="ida:ADFSMetadata" value="https://xxxxxxxxxx.com/FederationMetadata/2007-06/FederationMetadata.xml" />
|
||||
<add key="ida:Wtrealm" value="http://haufe/mvcwithadfs" />
|
||||
~~~xml
|
||||
<add key="ida:ADFSMetadata" value="https://xxxxxxxxxx.com/FederationMetadata/2007-06/FederationMetadata.xml" />
|
||||
<add key="ida:Wtrealm" value="http://haufe/mvcwithadfs" />
|
||||
~~~
|
||||
|
||||
And the OWIN-Code to specify the on-premise authentication is in Startup.Auth.cs:
|
||||
And the OWIN-Code to specify the on-premise authentication is in `Startup.Auth.cs`:
|
||||
|
||||
``` csharp
|
||||
public partial class Startup
|
||||
{
|
||||
~~~csharp
|
||||
public partial class Startup
|
||||
{
|
||||
private static string realm = ConfigurationManager.AppSettings["ida:Wtrealm"];
|
||||
private static string adfsMetadata = ConfigurationManager.AppSettings["ida:ADFSMetadata"];
|
||||
|
||||
|
@ -86,8 +88,8 @@ And the OWIN-Code to specify the on-premise authentication is in Startup.Auth.cs
|
|||
MetadataAddress = adfsMetadata
|
||||
});
|
||||
}
|
||||
}
|
||||
```
|
||||
}
|
||||
~~~
|
||||
|
||||
# Configure the On-Premise Identity Server (Job for IT) #
|
||||
|
||||
|
@ -97,18 +99,18 @@ On the identity server, these are the critical configuration pages for a new **R
|
|||
## Identifiers ##
|
||||
|
||||
{:.center}
|
||||
![]({{ site.url }}/images/adfs-identity/pic31.jpg){:style="margin:auto"}
|
||||
![]( /images/adfs-identity/pic31.jpg){:style="margin:auto"}
|
||||
|
||||
|
||||
**Display Name:** This is the name under which IT sees the **Relying Party Trust**.
|
||||
|
||||
**Relying Party identifiers:** This is a list of relying party identifiers, known on "our" ASP.NET side as **App ID URI**. The only important one is the **App ID URI** we assigned to our app when creating it. On this screen, you also see https://localhost:44306. This was automatically set by the Relying Party Trust Wizard when it asked for the first endpoint, since it assumed that the endpoint is also a default identifier. But since we specified a custom **App ID URI** (which gets transmitted by the user's browser), the http://haufe/mvcwithadfs entry is the only one which really matters.
|
||||
**Relying Party identifiers:** This is a list of relying party identifiers, known on "our" ASP.NET side as **App ID URI**. The only important one is the **App ID URI** we assigned to our app when creating it. On this screen, you also see `https://localhost:44306`. This was automatically set by the Relying Party Trust Wizard when it asked for the first endpoint, since it assumed that the endpoint is also a default identifier. But since we specified a custom **App ID URI** (which gets transmitted by the user's browser), the `http://haufe/mvcwithadfs` entry is the only one which really matters.
|
||||
|
||||
## Endpoints ##
|
||||
|
||||
This is the page which lists all browser source endpoints which are to be considered valid by the identity server. Here you see the entry which comes into play while we are debugging locally. Once your application has been uploaded to server, e.g. Azure, you must add the new endpoint e.g.:
|
||||
|
||||
https://xxxxxxxxxx.azurewebsites.net/
|
||||
`https://xxxxxxxxxx.azurewebsites.net/`
|
||||
|
||||
(not shown in the screen shot)
|
||||
|
||||
|
@ -117,7 +119,7 @@ https://xxxxxxxxxx.azurewebsites.net/
|
|||
**Issuance Authorization Rules**
|
||||
|
||||
{:.center}
|
||||
![]({{ site.url }}/images/adfs-identity/pic32.jpg){:style="margin:auto"}
|
||||
![]( /images/adfs-identity/pic32.jpg){:style="margin:auto"}
|
||||
|
||||
**Issuance Transform Rules**
|
||||
|
||||
|
@ -126,12 +128,12 @@ This is where we define which identity claims will go out to the requesting appl
|
|||
Add a rule named e.g. **AD2OutgoingClaims**
|
||||
|
||||
{:.center}
|
||||
![]({{ site.url }}/images/adfs-identity/pic33.jpg){:style="margin:auto"}
|
||||
![]( /images/adfs-identity/pic33.jpg){:style="margin:auto"}
|
||||
|
||||
and edit it like this:
|
||||
|
||||
{:.center}
|
||||
![]({{ site.url }}/images/adfs-identity/pic34.jpg){:style="margin:auto"}
|
||||
![]( /images/adfs-identity/pic34.jpg){:style="margin:auto"}
|
||||
|
||||
The last line is the special one (the others being fairly standard). The last line causes AD to export every group that the user belongs to as a role, which can then be queried on the application side.
|
||||
|
||||
|
@ -147,12 +149,12 @@ Because we have configured the outgoing claims to include a role for every group
|
|||
|
||||
You may create a controller with the Authorize attribute like this:
|
||||
|
||||
``` csharp
|
||||
[Authorize]
|
||||
public class RoleController : Controller
|
||||
{
|
||||
}
|
||||
```
|
||||
~~~csharp
|
||||
[Authorize]
|
||||
public class RoleController : Controller
|
||||
{
|
||||
}
|
||||
~~~
|
||||
|
||||
The **Authorize** attribute forces the user to be logged in before any requests are routed to this controller. The log in dialog will be opened automatically if necessary.
|
||||
|
||||
|
@ -160,38 +162,38 @@ It is also possible to use the **Authorize** attribute not on the entire control
|
|||
|
||||
Once inside a controller (or method) requiring authorization, you have access to the security Information of the user. In particular, you can check membership in a given role (group) like this:
|
||||
|
||||
``` csharp
|
||||
if (User.IsInRole("_Architects")
|
||||
{
|
||||
~~~csharp
|
||||
if (User.IsInRole("_Architects")
|
||||
{
|
||||
// do something
|
||||
}
|
||||
else
|
||||
{
|
||||
}
|
||||
else
|
||||
{
|
||||
// do something else
|
||||
}
|
||||
```
|
||||
}
|
||||
~~~
|
||||
|
||||
Within a cshtml file, you may also want to react to user membership in a certain role. One way to do this is to bind the cshtml file to a model class which contains the necessary boolean flags. Set those flags in the controller, e.g.:
|
||||
Within a `cshtml` file, you may also want to react to user membership in a certain role. One way to do this is to bind the cshtml file to a model class which contains the necessary boolean flags. Set those flags in the controller, e.g.:
|
||||
|
||||
``` csharp
|
||||
model.IsArchitect = User.IsInRole("_Architects");
|
||||
```
|
||||
~~~csharp
|
||||
model.IsArchitect = User.IsInRole("_Architects");
|
||||
~~~
|
||||
|
||||
Pass the model instance to the view, then evaluate those flags in the cshtml file:
|
||||
|
||||
``` csharp
|
||||
@if (Model.IsArchitect)
|
||||
{
|
||||
~~~csharp
|
||||
@if (Model.IsArchitect)
|
||||
{
|
||||
<div style="color:#00ff00">
|
||||
<text><b>Yes, you are in the Architect group.</b></text>
|
||||
</div>
|
||||
}
|
||||
else
|
||||
{
|
||||
}
|
||||
else
|
||||
{
|
||||
<div style="color:#ff0000">
|
||||
<text><b>No, you are not in the Architect group.</b></text>
|
||||
</div>
|
||||
}
|
||||
```
|
||||
}
|
||||
~~~
|
||||
|
||||
Instead of using flags within the data binding model, it may be easier to have the controller just assign a property to the ViewBag and evaluate the ViewBag in the cshtml file.
|
||||
|
|
Loading…
Reference in a new issue