173 lines
5.9 KiB
C#
173 lines
5.9 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Linq;
|
|
using System.Threading.Tasks;
|
|
#if (OrganizationalAuth || IndividualB2CAuth)
|
|
using Microsoft.AspNetCore.Authentication;
|
|
#endif
|
|
#if (OrganizationalAuth)
|
|
using Microsoft.AspNetCore.Authentication.AzureAD.UI;
|
|
#if (MultiOrgAuth)
|
|
using Microsoft.AspNetCore.Authentication.OpenIdConnect;
|
|
#endif
|
|
using Microsoft.AspNetCore.Authorization;
|
|
#endif
|
|
#if (IndividualB2CAuth)
|
|
using Microsoft.AspNetCore.Authentication.AzureADB2C.UI;
|
|
#endif
|
|
using Microsoft.AspNetCore.Builder;
|
|
#if (IndividualLocalAuth)
|
|
using Microsoft.AspNetCore.Identity;
|
|
#endif
|
|
using Microsoft.AspNetCore.Hosting;
|
|
using Microsoft.AspNetCore.Http;
|
|
#if (RequiresHttps)
|
|
using Microsoft.AspNetCore.HttpsPolicy;
|
|
#endif
|
|
using Microsoft.AspNetCore.Mvc;
|
|
#if (OrganizationalAuth)
|
|
using Microsoft.AspNetCore.Mvc.Authorization;
|
|
#endif
|
|
#if (IndividualLocalAuth)
|
|
using Microsoft.EntityFrameworkCore;
|
|
using Company.WebApplication1.Data;
|
|
#endif
|
|
using Microsoft.Extensions.Configuration;
|
|
using Microsoft.Extensions.DependencyInjection;
|
|
#if(MultiOrgAuth)
|
|
using Microsoft.IdentityModel.Tokens;
|
|
#endif
|
|
|
|
namespace Company.WebApplication1
|
|
{
|
|
public class Startup
|
|
{
|
|
public Startup(IConfiguration configuration)
|
|
{
|
|
Configuration = configuration;
|
|
}
|
|
|
|
public IConfiguration Configuration { get; }
|
|
|
|
// This method gets called by the runtime. Use this method to add services to the container.
|
|
public void ConfigureServices(IServiceCollection services)
|
|
{
|
|
services.Configure<CookiePolicyOptions>(options =>
|
|
{
|
|
// This lambda determines whether user consent for non-essential cookies is needed for a given request.
|
|
options.CheckConsentNeeded = context => true;
|
|
options.MinimumSameSitePolicy = SameSiteMode.None;
|
|
});
|
|
|
|
#if (IndividualLocalAuth)
|
|
services.AddDbContext<ApplicationDbContext>(options =>
|
|
#if (UseLocalDB)
|
|
options.UseSqlServer(
|
|
Configuration.GetConnectionString("DefaultConnection")));
|
|
#else
|
|
options.UseSqlite(
|
|
Configuration.GetConnectionString("DefaultConnection")));
|
|
#endif
|
|
services.AddDefaultIdentity<IdentityUser>()
|
|
.AddEntityFrameworkStores<ApplicationDbContext>();
|
|
#elif (OrganizationalAuth)
|
|
services.AddAuthentication(AzureADDefaults.AuthenticationScheme)
|
|
.AddAzureAD(options => Configuration.Bind("AzureAd", options));
|
|
#if (MultiOrgAuth)
|
|
|
|
services.Configure<OpenIdConnectOptions>(AzureADDefaults.OpenIdScheme, options =>
|
|
{
|
|
options.TokenValidationParameters = new TokenValidationParameters
|
|
{
|
|
// Instead of using the default validation (validating against a single issuer value, as we do in
|
|
// line of business apps), we inject our own multitenant validation logic
|
|
ValidateIssuer = false,
|
|
|
|
// If the app is meant to be accessed by entire organizations, add your issuer validation logic here.
|
|
//IssuerValidator = (issuer, securityToken, validationParameters) => {
|
|
// if (myIssuerValidationLogic(issuer)) return issuer;
|
|
//}
|
|
};
|
|
|
|
options.Events = new OpenIdConnectEvents
|
|
{
|
|
OnTicketReceived = context =>
|
|
{
|
|
// If your authentication logic is based on users then add your logic here
|
|
return Task.CompletedTask;
|
|
},
|
|
OnAuthenticationFailed = context =>
|
|
{
|
|
context.Response.Redirect("/Error");
|
|
context.HandleResponse(); // Suppress the exception
|
|
return Task.CompletedTask;
|
|
},
|
|
// If your application needs to do authenticate single users, add your user validation below.
|
|
//OnTokenValidated = context =>
|
|
//{
|
|
// return myUserValidationLogic(context.Ticket.Principal);
|
|
//}
|
|
};
|
|
});
|
|
#endif
|
|
#elif (IndividualB2CAuth)
|
|
services.AddAuthentication(AzureADB2CDefaults.AuthenticationScheme)
|
|
.AddAzureADB2C(options => Configuration.Bind("AzureAdB2C", options));
|
|
#endif
|
|
|
|
#if (OrganizationalAuth)
|
|
services.AddMvc(options =>
|
|
{
|
|
var policy = new AuthorizationPolicyBuilder()
|
|
.RequireAuthenticatedUser()
|
|
.Build();
|
|
options.Filters.Add(new AuthorizeFilter(policy));
|
|
})
|
|
.SetCompatibilityVersion(CompatibilityVersion.Version_2_1);
|
|
#else
|
|
services.AddMvc().SetCompatibilityVersion(CompatibilityVersion.Version_2_1);
|
|
#endif
|
|
}
|
|
|
|
// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
|
|
public void Configure(IApplicationBuilder app, IHostingEnvironment env)
|
|
{
|
|
if (env.IsDevelopment())
|
|
{
|
|
#if (UseBrowserLink)
|
|
app.UseBrowserLink();
|
|
#endif
|
|
app.UseDeveloperExceptionPage();
|
|
#if (IndividualLocalAuth)
|
|
app.UseDatabaseErrorPage();
|
|
#endif
|
|
}
|
|
else
|
|
{
|
|
app.UseExceptionHandler("/Home/Error");
|
|
#if (RequiresHttps)
|
|
app.UseHsts();
|
|
}
|
|
|
|
app.UseHttpsRedirection();
|
|
#else
|
|
}
|
|
|
|
#endif
|
|
app.UseStaticFiles();
|
|
app.UseCookiePolicy();
|
|
|
|
#if (OrganizationalAuth || IndividualAuth)
|
|
app.UseAuthentication();
|
|
|
|
#endif
|
|
app.UseMvc(routes =>
|
|
{
|
|
routes.MapRoute(
|
|
name: "default",
|
|
template: "{controller=Home}/{action=Index}/{id?}");
|
|
});
|
|
}
|
|
}
|
|
}
|