Commit Graph

355 Commits

Author SHA1 Message Date
Chris Ross (ASP.NET) aef7ff7959 Add JwtBearer test for SaveToken #1768 2018-07-12 14:13:25 -07:00
Chris Ross (ASP.NET) 47caa67a65 Rewrite JwtBearer token test #640 2018-07-12 14:02:10 -07:00
Hao Kung d2a8d3a61c
Fix cookie regression (#1811) 2018-07-11 13:14:51 -07:00
Patrick Westerhoff 06c93669d6 Allow overwriting parameters on challenge requests
Add a way to overwrite query arguments that are passed as part of the
challenge request to the external authentication provider in OAuth-based
authentication providers, including OpenID Connect.

This uses the new `AuthenticationProperties.Parameters` collection to
pass parameters to the authentication handler which will then look for
special items within that property bag, overwriting previously
configured values within the authentication options.

This can be used for example to overwrite the OAuth scopes that are
requested from an authentication provider, or to explicitly trigger a
reauthentication by requiring a login prompt with OpenID Connect. By
being able to specify this on individual challenge requests (using
`HttpContext.ChallengeAsync`), this is independent from the global
scheme configuration.

Custom ~ChallengeProperties types, e.g. `OAuthChallengeProperties` for
OAuth-based authentication providers, provide assistance in setting the
challenge request parameters but are not required to make the handlers
use the overwritten values.

- Adjust authentication handlers to respect the custom parameters, and
  add ~ChallengeProperties types.
- Introduce `OAuthHandler.FormatScope(IEnumerable<string>)` to format a
  custom set of scopes. Subclasses requiring a different scope format
  should override this method instead of the parameterless overload.
  Overriding just `FormatScope()` will prevent handlers from supporting
  overwriting the OAuth `scope` in a challenge request.
- Refactor GoogleHandler to support parameterization through both the
  `Parameters` and the `Items` collection (former is preferred) to keep
  compatibility with the old behavior.
- Add an OpenIdConnect sample to overwrite the prompt argument in a
  challenge request.
- Add extensive tests.
2018-03-23 02:09:05 +01:00
Patrick Westerhoff d24fddcf59 Clean up tests
- Make Facebook test server asynchronous to avoid having to
  block for the result.
- Clean up some formatting.
2018-03-23 01:33:50 +01:00
Chris Ross (ASP.NET) 90064ce9df Add ClaimActions for bulk add and remove. #1609 2018-03-21 16:35:37 -07:00
Chris Ross (ASP.NET) 81fb221d9e Embed OIDC metadata and mock out the backchannel #1686 2018-03-20 12:42:16 -07:00
Hao Kung bee77ebf91
Rename VirtualScheme => PolicyScheme (#1665)
* VirtualScheme => PolicyScheme

* Use SignInHandler base for cookies

* PolicySchemeHandlers throw NotImplemented by default

* Remove redundant interface
2018-03-13 11:09:43 -07:00
Alexander Klingenbeck 4103d47f09 Rename ns Microsoft.AspNetCore.Authroization.Test to Microsoft.AspNetCore.Authorization.Test (#1693) 2018-03-13 10:57:36 -07:00
Chris Ross (ASP.NET) 1df139eb6d Clone tickets for sliding refresh #1607 2018-03-06 08:56:45 -08:00
Chris Ross (ASP.NET) 9839799645 Add CookiePolicy logging #1588 2018-03-02 09:53:03 -08:00
Chris Ross (ASP.NET) 21acbf06e8 Update google auth endpoint to v2 #1307 2018-02-28 10:51:13 -08:00
Chris Ross (ASP.NET) cc8acdff57 Update facebook API version to 2.12 #1306 2018-02-28 09:48:07 -08:00
Chris Ross (ASP.NET) d95109c96d #43 Add Microsoft.AspNetCore.Authentication.WsFederation, samples, and tests.
#1443 Block unsolicited wsfed logins by default.
#1520 Update WsFed to use the 2.0 event structure
#1425 Implement WsFed remote signout cleanup
Rework WsFed RemoteSignOutPath logic to work with ADFS #1581
Update versions, dependencies.
2018-02-26 15:31:39 -08:00
Hao Kung c0b8be58ba
Add scheme forwarding (authN policies) (#1625) 2018-02-01 14:40:56 -08:00
Chris Ross (ASP.NET) c729063c31 Fix flaky cookie policy tests #1629 2018-01-30 15:27:52 -08:00
Chris Ross (ASP.NET) ab8328abca Raise the CookiePolicy consent cookie lifetime to one year #1589 2018-01-26 08:52:08 -08:00
Chris Ross (ASP.NET) 1f855f7b06 Implement ITrackingConsentFeature.CreateConsentCookie() #1590 2018-01-05 12:34:39 -08:00
Chris Ross (ASP.NET) e13ceb690b Detect remote denails for Twitter accounts 2018-01-02 15:40:48 -08:00
Chris Ross (ASP.NET) f8b4f4c620 Add consent to CookiePolicy #1561 2017-12-27 13:38:18 -08:00
Pranav K f8711a2da3 Update samples and tests to target netcoreapp2.1 2017-11-13 17:24:59 -08:00
Mikael Frosthage 5e51cb5c69 Fixed summary tag on comment (#1535) 2017-11-10 08:46:12 -08:00
Nate McMaster 148aef110e Remove redundant ProjectReference's in Auth.Test.csproj
cref dotnet/sdk#1716
2017-11-07 17:30:50 -08:00
Hao Kung 72e1cb1385 Add VirtualSchemes 2017-11-06 14:16:57 -08:00
Nate McMaster bd8ecd0268 Pin tool and package versions to make builds more repeatable
Part of aspnet/Universe#575
2017-11-01 16:37:42 -07:00
Chris Ross (ASP.NET) 00c9210157 Refactor OIDC event tests 2017-11-01 15:53:26 -07:00
tstojecki 88cb3df0eb Added support for multiple values (arrays) in default claim action (#1501)
* Added support for multiple values (arrays) in default claim action

* Added tests to claim action update to support array values
2017-10-31 09:27:07 -07:00
Chris Ross (ASP.NET) 824539f47a #1349 Don't throw for partial cookies 2017-10-12 10:14:19 -07:00
Hao Kung 02cd997e32 Add Validate(scheme) and use for RemoteSignInScheme not self validation 2017-10-10 14:17:07 -07:00
Chris Ross (ASP.NET) 0904af8ff3 PR style cleanup 2017-10-09 11:45:51 -07:00
OpenIDAuthority e34a5f8fb8 Add MaxAge to OpenIdConnectOptions
- max_age parameter added to the authentication request if MaxAge is not null
 - throws exception if MaxAge is set to a negative value
 - Fractions of seconds are ignored
 - See http://openid.net/specs/openid-connect-core-1_0.html#AuthRequest for expected behavior

Addresses #1233
2017-10-09 11:45:51 -07:00
Javier Calvarro Nelson 3e7d1a7fd4 React to updated IdentityModel version 2017-10-06 16:09:26 -07:00
Nate McMaster 54e4f6834e Minor test code changes to resolve xUnit2013 build error 2017-10-05 15:35:51 -07:00
Chris R 144ee21696 #1188 Add AuthenticationProperties to HandleRequestResult and RemoteFailureContext 2017-09-27 14:18:42 -07:00
Chris Ross (ASP.NET) 13fdbac48f #942 Add the SignedOutCallbackRedirect event for OIDC 2017-09-22 15:29:15 -07:00
Hao Kung b9d9418f6d Block SignInScheme = self 2017-09-15 14:22:03 -07:00
Nate McMaster a53bf093a7 Use PackageLineup to manage PackageReference versions 2017-08-29 15:26:04 -07:00
Nate McMaster 724be48ee9 Use Directory.Build.props/targets 2017-08-29 15:24:01 -07:00
Damir Ainullin c8a99e5806 Removed redundant if checks (#1390) 2017-08-28 11:12:27 -06:00
Nate McMaster 5b29bced0d Upgrade to xunit 2.3.0-beta4
Includes changes to assertions as required by xunit.analyzers 0.6
2017-08-22 18:12:32 -07:00
Saravanan 43db99a568 Updated for the TwitterOptions Validation for the ConsumerKey and Con… (#1337) 2017-08-14 10:29:02 -07:00
Chris Ross 0c82d94a54 #772 Signout FormPost test (#1358) 2017-08-11 11:50:25 -07:00
Justin Kotalik 4eb1306692 Reacting to ResponseCookie Delete changes (#1362)
594f55947f
2017-08-11 10:24:18 -07:00
Chris R c125022050 #772 Fill in OIDC test gaps 2017-08-09 15:29:34 -07:00
Hao Kung 644f34e90d AuthZ PolicyEvalutor should take resource 2017-07-21 11:04:01 -07:00
Chris R 36d3d97b99 #1319 Add DisplayName overloads 2017-07-13 15:20:24 -07:00
Hao Kung df325deaf3 Add AddAuthentication(defaultScheme) overload 2017-07-07 12:06:00 -07:00
Hao Kung 38d33cfbf2 Fix tests to work with new default 2017-07-07 11:36:58 -07:00
Hao Kung 23da476176 Switch to IOptionsMonitor (#1295) 2017-07-06 13:41:47 -07:00
Nate McMaster bd19ba9533 Revert obsoleting CookieAuthenticationOptions.ExpireTimeSpan (#1296)
- Revert the obsoleting of CookieAuthenticationOptions.ExpireTimeSpan in aspnet/Security#1285
- Add test to ensure Cookie.Expiration is ignored
2017-07-05 15:43:43 -07:00