openiddict-documentation/guide/getting-started.md

232 lines
9.0 KiB
Markdown
Raw Normal View History

# Getting started
2021-01-13 12:48:11 +08:00
**To implement a custom OpenID Connect server using OpenIddict, the simplest option is to clone one of the official samples** from the [openiddict-samples repository](https://github.com/openiddict/openiddict-samples).
2021-01-13 12:48:11 +08:00
If you don't want to start from one of the recommended samples, you'll need to:
2021-01-13 12:48:11 +08:00
- **Install the [.NET Core 2.1.x, 3.1.x or .NET 5.0.x tooling](https://www.microsoft.com/net/download)**.
2021-01-13 12:48:11 +08:00
- **Have an existing project or create a new one**: when creating a new project using Visual Studio's default ASP.NET Core template,
using **individual user accounts authentication** is strongly recommended as it automatically includes the default ASP.NET Core Identity UI, based on Razor Pages.
2021-02-09 00:08:43 +08:00
- **Update your `.csproj` file** to reference the latest `OpenIddict` packages:
```xml
2021-04-09 18:48:26 +08:00
<PackageReference Include="OpenIddict.AspNetCore" Version="3.0.3" />
<PackageReference Include="OpenIddict.EntityFrameworkCore" Version="3.0.3" />
```
2021-01-13 12:48:11 +08:00
- **Configure the OpenIddict core, server and validation services** in `Startup.ConfigureServices`.
Here's an example for the client credentials grant, used in machine-to-machine scenarios:
```csharp
public void ConfigureServices(IServiceCollection services)
{
2021-01-13 12:48:11 +08:00
services.AddControllersWithViews();
services.AddDbContext<ApplicationDbContext>(options =>
{
// Configure the context to use Microsoft SQL Server.
2021-01-13 12:48:11 +08:00
options.UseSqlServer(Configuration.GetConnectionString("DefaultConnection"));
// Register the entity sets needed by OpenIddict.
// Note: use the generic overload if you need
// to replace the default OpenIddict entities.
options.UseOpenIddict();
});
services.AddOpenIddict()
2021-01-13 12:48:11 +08:00
// Register the OpenIddict core components.
.AddCore(options =>
{
2021-01-13 12:48:11 +08:00
// Configure OpenIddict to use the Entity Framework Core stores and models.
// Note: call ReplaceDefaultEntities() to replace the default entities.
options.UseEntityFrameworkCore()
.UseDbContext<ApplicationDbContext>();
})
2021-01-13 12:48:11 +08:00
// Register the OpenIddict server components.
.AddServer(options =>
{
2021-01-13 12:48:11 +08:00
// Enable the token endpoint.
options.SetTokenEndpointUris("/connect/token");
2021-01-13 12:48:11 +08:00
// Enable the client credentials flow.
options.AllowClientCredentialsFlow();
2021-01-13 12:48:11 +08:00
// Register the signing and encryption credentials.
options.AddDevelopmentEncryptionCertificate()
.AddDevelopmentSigningCertificate();
2021-01-13 12:48:11 +08:00
// Register the ASP.NET Core host and configure the ASP.NET Core options.
options.UseAspNetCore()
.EnableTokenEndpointPassthrough();
})
2021-01-13 12:48:11 +08:00
// Register the OpenIddict validation components.
.AddValidation(options =>
{
// Import the configuration from the local OpenIddict server instance.
options.UseLocalServer();
// Register the ASP.NET Core host.
options.UseAspNetCore();
});
// Register the worker responsible of seeding the database with the sample clients.
// Note: in a real world application, this step should be part of a setup script.
services.AddHostedService<Worker>();
}
```
2021-01-13 12:48:11 +08:00
- **Make sure the ASP.NET Core authentication middleware is correctly registered at the right place**:
```csharp
public void Configure(IApplicationBuilder app)
{
2021-01-13 12:48:11 +08:00
app.UseDeveloperExceptionPage();
app.UseRouting();
app.UseAuthentication();
2021-01-13 12:48:11 +08:00
app.UseAuthorization();
2021-01-13 12:48:11 +08:00
app.UseEndpoints(options =>
{
options.MapControllers();
options.MapDefaultControllerRoute();
});
app.UseWelcomePage();
}
```
- **Update your Entity Framework Core context registration to register the OpenIddict entities**:
```csharp
services.AddDbContext<ApplicationDbContext>(options =>
{
// Configure the context to use Microsoft SQL Server.
2021-01-13 12:48:11 +08:00
options.UseSqlServer(Configuration.GetConnectionString("DefaultConnection"));
// Register the entity sets needed by OpenIddict.
// Note: use the generic overload if you need
// to replace the default OpenIddict entities.
options.UseOpenIddict();
});
```
2021-01-13 12:48:11 +08:00
> [!WARNING]
> If you change the default entity primary key (e.g. to `int` or `Guid` instead of `string`), make sure you use the `options.ReplaceDefaultEntities<TKey>()`
2021-01-13 12:48:11 +08:00
> core extension accepting a `TKey` generic argument and use the generic `options.UseOpenIddict<TKey>()` overload to configure EF Core to use the specified type:
>
> ```csharp
> services.AddOpenIddict()
> .AddCore(options =>
> {
> // Configure OpenIddict to use the default entities with a custom key type.
> options.UseEntityFrameworkCore()
> .UseDbContext<ApplicationDbContext>()
> .ReplaceDefaultEntities<Guid>();
> });
>
> services.AddDbContext<ApplicationDbContext>(options =>
> {
> // Configure the context to use Microsoft SQL Server.
> options.UseSqlServer(configuration["Data:DefaultConnection:ConnectionString"]);
>
> options.UseOpenIddict<Guid>();
> });
>```
- **Create your own authorization controller:**
Implementing a custom authorization controller is required to allow OpenIddict to create tokens based on the identities and claims you provide.
Here's an example for the client credentials grant:
```csharp
2021-01-13 12:48:11 +08:00
public class AuthorizationController : Controller
{
2021-02-13 01:13:47 +08:00
private readonly IOpenIddictApplicationManager _applicationManager;
2021-01-13 12:48:11 +08:00
public AuthorizationController(IOpenIddictApplicationManager applicationManager)
=> _applicationManager = applicationManager;
[HttpPost("~/connect/token"), Produces("application/json")]
public async Task<IActionResult> Exchange()
{
var request = HttpContext.GetOpenIddictServerRequest();
if (!request.IsClientCredentialsGrantType())
{
2021-01-13 12:48:11 +08:00
throw new NotImplementedException("The specified grant is not implemented.");
}
2021-01-13 12:48:11 +08:00
// Note: the client credentials are automatically validated by OpenIddict:
// if client_id or client_secret are invalid, this action won't be invoked.
2021-01-13 12:48:11 +08:00
var application =
await _applicationManager.FindByClientIdAsync(request.ClientId) ??
throw new InvalidOperationException("The application cannot be found.");
2021-01-13 12:48:11 +08:00
// Create a new ClaimsIdentity containing the claims that
// will be used to create an id_token, a token or a code.
var identity = new ClaimsIdentity(
TokenValidationParameters.DefaultAuthenticationType,
Claims.Name, Claims.Role);
2021-01-13 12:48:11 +08:00
// Use the client_id as the subject identifier.
identity.AddClaim(Claims.Subject,
await _applicationManager.GetClientIdAsync(application),
Destinations.AccessToken, Destinations.IdentityToken);
identity.AddClaim(Claims.Name,
await _applicationManager.GetDisplayNameAsync(application),
Destinations.AccessToken, Destinations.IdentityToken);
return SignIn(new ClaimsPrincipal(identity),
OpenIddictServerAspNetCoreDefaults.AuthenticationScheme);
}
}
```
2021-01-13 12:48:11 +08:00
- **Register your client application** (e.g from an `IHostedService` implementation):
```csharp
2021-01-13 12:48:11 +08:00
public class Worker : IHostedService
{
2021-01-13 12:48:11 +08:00
private readonly IServiceProvider _serviceProvider;
2021-01-13 12:48:11 +08:00
public Worker(IServiceProvider serviceProvider)
=> _serviceProvider = serviceProvider;
2021-01-13 12:48:11 +08:00
public async Task StartAsync(CancellationToken cancellationToken)
{
2021-01-13 12:48:11 +08:00
using var scope = _serviceProvider.CreateScope();
var context = scope.ServiceProvider.GetRequiredService<ApplicationDbContext>();
await context.Database.EnsureCreatedAsync();
2021-01-13 12:48:11 +08:00
var manager =
scope.ServiceProvider.GetRequiredService<IOpenIddictApplicationManager>();
if (await manager.FindByClientIdAsync("console") is null)
{
await manager.CreateAsync(new OpenIddictApplicationDescriptor
{
ClientId = "console",
ClientSecret = "388D45FA-B36B-4988-BA59-B187D329C207",
DisplayName = "My client application",
Permissions =
{
Permissions.Endpoints.Token,
Permissions.GrantTypes.ClientCredentials
}
});
}
}
2021-01-13 12:48:11 +08:00
public Task StopAsync(CancellationToken cancellationToken) => Task.CompletedTask;
}
2021-01-13 12:48:11 +08:00
2021-02-13 01:13:47 +08:00
```