现有 Asp.Net 核心应用程序中缺少 Azure Active Direc

Authentication with Azure Active Directory connected services missing in existing Asp.Net core application(现有 Asp.Net 核心应用程序中缺少 Azure Active Directory 连接服务的身份验证)
本文介绍了现有 Asp.Net 核心应用程序中缺少 Azure Active Directory 连接服务的身份验证的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我有现有的 Asp.net core 2.0 应用程序.我正在尝试向其添加使用 Azure Active Directory 连接服务的身份验证.当我尝试右键单击连接的服务并检查使用 Azure Active Directory 连接的服务进行身份验证时,我没有找到该选项.我在网上搜索,发现对于现有的 asp.net 核心应用程序,没有连接服务选项.在这种情况下会有什么解决方法?有什么提示吗?

I have existing Asp.net core 2.0 application. I am trying to add Authentication with Azure Active Directory connected service to it. When I tried to right click on connected services and checked for Authentication with Azure Active Directory connected service, I did not find the option. I searched online and found that for existing asp.net core applications there is not connected service option. What will be the work around in this case? any hints?

推荐答案

您可以尝试以下步骤:

  1. 安装包:Microsoft.AspNetCore.Authentication.AzureAD.UI

修改 Startup.cs 以启用 Azure AD 身份验证:

Modify the Startup.cs to enable Azure AD Authentication:

services.Configure<CookiePolicyOptions>(options =>
{
    // This lambda determines whether user consent for non-essential cookies is needed for a given request.
    options.CheckConsentNeeded = context => true;
    options.MinimumSameSitePolicy = SameSiteMode.None;
});

services.AddAuthentication(AzureADDefaults.AuthenticationScheme)
    .AddAzureAD(options => Configuration.Bind("AzureAd", options));

services.AddMvc().SetCompatibilityVersion(CompatibilityVersion.Version_2_1);

  • 将认证中间件添加到配置中:

  • Add the authentication middleware to Configure :

    app.UseAuthentication();
    

  • 修改 appsettings.json 以添加 Azure AD 应用设置

  • Modify the appsettings.json to add the Azure AD app settings

    {
    "AzureAd": {
        "Instance": "https://login.microsoftonline.com/",
        "Domain": "xxxxxxx.onmicrosoft.com",
        "TenantId": "xxxxxx-e83b-4099-93c2-8ae86358d05c",
        "ClientId": "xxxxxxxx-80c5-4bd4-ad6a-a967ea0066d6",
        "CallbackPath": "/signin-oidc"
    },
    "Logging": {
        "LogLevel": {
        "Default": "Warning"
        }
    },
    "AllowedHosts": "*"
    }
    

  • 另一种方法是手动配置 OpenId Connect Middlerware,您可以参考以下文章:

    Another way is to config the OpenId Connect Middlerware manually , you can refer to below article :

    https://joonasw.net/view/aspnet-core-2-azure-ad-authentication

    这篇关于现有 Asp.Net 核心应用程序中缺少 Azure Active Directory 连接服务的身份验证的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持编程学习网!

    本站部分内容来源互联网,如果有图片或者内容侵犯您的权益请联系我们删除!

    相关文档推荐

    DispatcherQueue null when trying to update Ui property in ViewModel(尝试更新ViewModel中的Ui属性时DispatcherQueue为空)
    Drawing over all windows on multiple monitors(在多个监视器上绘制所有窗口)
    Programmatically show the desktop(以编程方式显示桌面)
    c# Generic Setlt;Tgt; implementation to access objects by type(按类型访问对象的C#泛型集实现)
    InvalidOperationException When using Context Injection in ASP.Net Core(在ASP.NET核心中使用上下文注入时发生InvalidOperationException)
    LINQ many-to-many relationship, how to write a correct WHERE clause?(LINQ多对多关系,如何写一个正确的WHERE子句?)