使用Web表单身份验证时,如何防止[授权(角色="xxx")]在openidconnect中进行验证



在我的登录网页中,我有一个WebForm(Identity 2.0),您可以在数据库中创建一个帐户,也可以使用Azure Active Directory使用公司电子邮件来验证。(外部验证)

我将[Authorize]属性放置在UserController中的index()操作。我的List()操作在同一控制器中的装饰如下:[Authorize (Roles = "Admin")]

使用我的WebForm登录登录时,如果我转到/myController/list/我将重定向到Microsoft帐户登录页面。到达/mycontroller/index时,我没有重定向。

是什么原因导致这种行为?当用户使用WebForm登录时,我不想检查Azure。我如何防止这种情况发生?

这是我的startup.auth.cs

    public partial class Startup
{
    private static string clientId = ConfigurationManager.AppSettings["ida:ClientId"];
    private static string appKey = ConfigurationManager.AppSettings["ida:ClientSecret"];
    private static string aadInstance = ConfigurationManager.AppSettings["ida:AADInstance"];
    private static string tenantId = ConfigurationManager.AppSettings["ida:TenantId"];
    private static string postLogoutRedirectUri = ConfigurationManager.AppSettings["ida:PostLogoutRedirectUri"];
    public static readonly string Authority = aadInstance + tenantId;
    // This is the resource ID of the AAD Graph API.  We'll need this to request a token to call the Graph API.
    string graphResourceId = "https://graph.windows.net";

    // For more information on configuring authentication, please visit http://go.microsoft.com/fwlink/?LinkId=301864
    public void ConfigureAuth(IAppBuilder app)
    {
        // Configure the db context, user manager and role manager to use a single instance per request
        app.CreatePerOwinContext(ApplicationDbContext.Create);
        app.CreatePerOwinContext<ApplicationUserManager>(ApplicationUserManager.Create);
        app.CreatePerOwinContext<ApplicationRoleManager>(ApplicationRoleManager.Create);
        app.CreatePerOwinContext<ApplicationSignInManager>(ApplicationSignInManager.Create);
        // Enable the application to use a cookie to store information for the signed in user
        // and to use a cookie to temporarily store information about a user logging in with a third party login provider
        // Configure the sign in cookie
        app.UseCookieAuthentication(new CookieAuthenticationOptions
        {
            AuthenticationType = DefaultAuthenticationTypes.ApplicationCookie,
            LoginPath = new PathString("/Account/Login"),
            Provider = new CookieAuthenticationProvider
            {
                // Enables the application to validate the security stamp when the user logs in.
                // This is a security feature which is used when you change a password or add an external login to your account.  
                OnValidateIdentity = SecurityStampValidator.OnValidateIdentity<ApplicationUserManager, ApplicationUser>(
                    validateInterval: TimeSpan.FromMinutes(30),
                    regenerateIdentity: (manager, user) => user.GenerateUserIdentityAsync(manager))
            }
        });
        // Enables the application to temporarily store user information when they are verifying the second factor in the two-factor authentication process.
        app.UseTwoFactorSignInCookie(DefaultAuthenticationTypes.TwoFactorCookie, TimeSpan.FromMinutes(5));
        // Enables the application to remember the second login verification factor such as phone or email.
        // Once you check this option, your second step of verification during the login process will be remembered on the device where you logged in from.
        // This is similar to the RememberMe option when you log in.
        app.UseTwoFactorRememberBrowserCookie(DefaultAuthenticationTypes.TwoFactorRememberBrowserCookie);
        // Pour Azure
        app.UseOpenIdConnectAuthentication(new OpenIdConnectAuthenticationOptions
        {
            ClientId = clientId,
            Authority = Authority,
            PostLogoutRedirectUri = postLogoutRedirectUri,
            AuthenticationType = OpenIdConnectAuthenticationDefaults.AuthenticationType,
            Notifications = new OpenIdConnectAuthenticationNotifications()
            {
                // If there is a code in the OpenID Connect response, redeem it for an access token and refresh token, and store those away.
                AuthorizationCodeReceived = (context) =>
                {
                    var code = context.Code;
                    ClientCredential credential = new ClientCredential(clientId, appKey);
                    string signedInUserID = context.AuthenticationTicket.Identity.FindFirst(ClaimTypes.NameIdentifier).Value;
                    AuthenticationContext authContext = new AuthenticationContext(Authority, new ADALTokenCache(signedInUserID));
                    Task<AuthenticationResult> result = authContext.AcquireTokenByAuthorizationCodeAsync(
                    code, new Uri(HttpContext.Current.Request.Url.GetLeftPart(UriPartial.Path)), credential, graphResourceId);
                    return Task.FromResult(0);
                }
            }
        });
        app.UseExternalSignInCookie(DefaultAuthenticationTypes.ExternalCookie);

        // Uncomment the following lines to enable logging in with third party login providers
        //app.UseMicrosoftAccountAuthentication(
        //    clientId: "",
        //    clientSecret: "");
        //app.UseTwitterAuthentication(
        //   consumerKey: "",
        //   consumerSecret: "");
        //app.UseFacebookAuthentication(
        //   appId: "",
        //   appSecret: "");
        //app.UseGoogleAuthentication(
        //    clientId: "",
        //    clientSecret: "");
    }
}

编辑

这是控制器代码

using System.Web.Mvc;
namespace MyApp.Controllers
{
    public class AccueilController : Controller
    {
        [Authorize]
        public ActionResult Index()
        {
            return View();
        }
        [Authorize(Roles = "Admin")]
        public ActionResult List()
        {
            return View();
        }
    }
}

我登录了cookie authenticatoin(电子邮件/密码)。

  1. 我打了索引动作,我在应用程序中看到了该页面的内容。
  2. 如果我点击列表()操作,我将重定向到OpenIDConnect登录页面。

WebForms用户没有管理员角色,但是您的广告用户似乎具有管理员角色。您可以快速查询AspNetUserRoles表。

[Authorize(Roles="Admin")]装饰动作将使它仅适用于该角色的用户。未经授权用户的默认行为(不论用户身份验证状态是否)将其重定向到登录页面。

您的选择是:

  1. 子类AuthorizeAttribute并覆盖默认行为。
  2. 将用户重定向其他地方(也许是具有正确状态代码设置的禁止页面),如果他经过身份验证。

据我所知,默认的重定向行为不能像您在ASP.NET Core中那样子 AuthorizeAttribute的情况下覆盖。

相关内容

  • 没有找到相关文章