Workleap.AspNetCore.Authentication.ClientCredentialsGrant
2.1.0
Prefix Reserved
See the version list below for details.
dotnet add package Workleap.AspNetCore.Authentication.ClientCredentialsGrant --version 2.1.0
NuGet\Install-Package Workleap.AspNetCore.Authentication.ClientCredentialsGrant -Version 2.1.0
<PackageReference Include="Workleap.AspNetCore.Authentication.ClientCredentialsGrant" Version="2.1.0" />
paket add Workleap.AspNetCore.Authentication.ClientCredentialsGrant --version 2.1.0
#r "nuget: Workleap.AspNetCore.Authentication.ClientCredentialsGrant, 2.1.0"
// Install Workleap.AspNetCore.Authentication.ClientCredentialsGrant as a Cake Addin #addin nuget:?package=Workleap.AspNetCore.Authentication.ClientCredentialsGrant&version=2.1.0 // Install Workleap.AspNetCore.Authentication.ClientCredentialsGrant as a Cake Tool #tool nuget:?package=Workleap.AspNetCore.Authentication.ClientCredentialsGrant&version=2.1.0
Workleap.Authentication.ClientCredentialsGrant
Description | Download link | Build status |
---|---|---|
Client-side library for any .NET application | ||
Server-side library for ASP.NET Core web applications |
This set of two libraries enables authenticated machine-to-machine HTTP communication between a .NET application and an ASP.NET Core web application. HTTP requests are authenticated with JSON web tokens (JWT) issued by an OAuth 2.0 authorization server using the client credentials grant flow.
┌────────────────────────────────┐
┌─────────►│ OAuth 2.0 authorization server │◄──────────┐
│ └────────────────────────────────┘ │
│ │
│ get token with get signing keys │
│ client credentials grant flow │ validate
│ │ token
┌─┴───────────┐ ┌───────────────┴────────┐
│ Client .NET ├──────────────────────────►│ Protected ASP.NET Core │
│ application │ authenticated HTTP call │ service │
└─────────────┘ └────────────────────────┘
The client-side library includes:
- Automatic acquisition and lifetime management of client credentials-based access tokens.
- Optimized access token caching with two layers of cache using IMemoryCache, IDistributedCache, and data protection for encryption.
- Built-in customizable retry policy for production-grade resilient HTTP requests made to the OAuth 2.0 authorization server.
- Built as an extension for the Microsoft.Extensions.Http library.
- Support for .NET Standard 2.0.
The server-side library includes:
- JWT authentication using the Microsoft.AspNetCore.Authentication.JwtBearer library.
- Authorization attribute and policy to easily enforce granular scopes on your endpoints.
- Authorization attribute and policy to easily enforce classic Workleap permissions (read, write, admin).
- Support of OpenAPI security definition and security requirement generation when using Swashbuckle.
- Non-intrusive: default policies must be explicitly used, and the default authentication scheme can be modified.
- Support for ASP.NET Core 6.0 and later.
Requirements and Considerations:
- Your OAuth 2.0 authorization server must expose its metadata at the URL
<AUTHORITY>/.well-known/openid-configuration
, as described in RFC 8414. - The client-side application uses data protection. It is important to note that your data protection configuration should support distributed workloads if you have multiple instances of a client application. Microsoft recommends using a combination of Azure Key Vault and Azure Storage to ensure that data encrypted by an instance of a client application can be read by another instance.
Getting started
Client-side library
Install the package Workleap.Extensions.Http.Authentication.ClientCredentialsGrant in your client-side application
that needs to communicate with the protected ASP.NET Core server. Then, use one of the following methods to configure an authenticated HttpClient
:
// Method 1: directly set the options values with C# code
services.AddHttpClient("MyClient").AddClientCredentialsHandler(options =>
{
options.Authority = "<oauth2_authorization_server_base_url>";
options.ClientId = "<oauth2_client_id>";
options.ClientSecret = "<oauth2_client_secret>"; // use a secret store instead of hardcoding the value
options.Scope = "<optional_requested_scope>"; // use "Scopes" for multiple values
});
// Method 2: bind the options to a configuration section
services.AddHttpClient("MyClient").AddClientCredentialsHandler(configuration.GetRequiredSection("MyConfigSection").Bind);
// Method 3: Lazily bind the options to a configuration section
services.AddHttpClient("MyClient").AddClientCredentialsHandler();
services.AddOptions<ClientCredentialsOptions>("MyClient").Bind(configuration.GetRequiredSection("MyConfigSection"));
// appsettings.json:
{
"MyConfigSection": {
"Authority": "<oauth2_authorization_server_base_url>",
"ClientId": "<oauth2_client_id>",
"ClientSecret": "<oauth2_client_secret>", // use a secret configuration provider instead of hardcoding the value
"Scope": "<optional_requested_scope>", // use "Scopes" for multiple values,
"EnforceHttps": "<boolean>", // use EnforceHttps to force all authenticated to be sent via https
}
}
// You can also use the generic HttpClient registration with any of these methods:
services.AddHttpClient<MyClient>().AddClientCredentialsHandler( /* [...] */);
Note on EnforceHttps
.
It is possible to allow http authenticated requests, however, this should be limited to exceptional scenarios.
It is strongly advised that you always use https for authenticated requests transmitted as the token sent will be in clear.
Then, instantiate the HttpClient
later on using IHttpClientFactory
or directly inject it in the constructor if you used the generic registration:
public class MyClient
{
private readonly HttpClient _httpClient;
public MyClient(IHttpClientFactory httpClientFactory)
{
this._httpClient = httpClientFactory.CreateClient("MyClient");
}
public async Task DoSomeAuthenticatedHttpCallAsync()
{
await this._httpClient.GetStringAsync("https://myservice");
}
}
Starting from version 1.3.0, tokens are pre-fetched and cached at app startup.
Subsequently, there is a periodic refresh of the token before its expiration and cache eviction.
This behavior can be disabled by setting ClientCredentialsOptions.EnablePeriodicTokenBackgroundRefresh
to false
.
This client-side library is based on Duende.AccessTokenManagement, Copyright (c) Brock Allen & Dominick Baier, licensed under the Apache License, Version 2.0.
Server-side library
The server-side library add the RequireClientCredentials
attribute that simplify the use of the client credentials flow in your ASP.NET Core application:
- Simply specify the required permissions in the attribute (e.g:
[RequireClientCredentials("read")
] - Support multiple claims types (e.g:
scope
,scp
,http://schemas.microsoft.com/identity/claims/scope
) - Support multiple claims format (e.g:
read
,{Audience}:read
)
Install the package Workleap.AspNetCore.Authentication.ClientCredentialsGrant in your server-side ASP.NET Core application and register the authentication services:
// Registers Microsoft's JwtBearer handler with a default "ClientCredentials" authentication scheme.
// This authentication scheme can be changed using other methods overloads.
builder.Services.AddAuthentication().AddClientCredentials();
This will automatically bind the configuration section Authentication:Schemes:ClientCredentials
(unless you've changed the authentication scheme).
For instance, the example above works well with this appsettings.json
:
{
"Authentication": {
"Schemes": {
"ClientCredentials": {
"Authority": "<oauth2_authorization_server_base_url>",
"Audience": "<audience>",
"MetadataAddress": "<oauth2_authorization_server_metadata_address>"
}
}
}
}
Next, protect your endpoints with the RequireClientCredentials
attribute:
// When using Controlled-Based
[HttpGet]
[Route("weather")]
[RequireClientCredentials("read")]
public async Task<IActionResult> GetWeather()
{...}
// When using Minimal APIs
app.MapGet("/weather", () => {...}).RequireClientCredentials("read");
Next, register the authorization services which all the required authorization policies:
builder.Services
.AddClientCredentialsAuthorization();
Finally, register the authentication and authorization middlewares in your ASP.NET Core app.
var app = builder.Build();
// [...]
app.UseAuthentication();
app.UseAuthorization();
// [...] Map your endpoints
OpenAPI integration
If you are using Swashbuckle to document your API, the [RequireClientCredentials]
attribute will automatically populate the security definitions and requirements in the OpenAPI specification. For minimal APIs, there is a corresponding RequireClientCredentials()
method.
For example:
// Controlled-based approach
[HttpGet]
[Route("weather")]
[RequireClientCredentials("read")]
public async Task<IActionResult> GetWeather()
{ /* ... */ }
// Minimal APIs
app.MapGet("/weather", () => { /* ... */ }).RequireClientCredentials("read");
Will generate this:
paths:
/weather:
get:
summary: 'Required scope: read.'
responses:
'200':
description: OK
'401':
description: Unauthorized
'403':
description: Forbidden
security:
- clientcredentials:
- target-entity:b108bbc9-538e-403b-9faf-e5cd874eb17f:read # Based on the provided JwtBearerOptions.Audience
components:
securitySchemes:
clientcredentials:
type: oauth2
flows:
clientCredentials:
tokenUrl: https://localhost:9020/oauth2/token # Based on provided ClientCredentials.Authority
scopes:
target-entity:b108bbc9-538e-403b-9faf-e5cd874eb17f: Request all permissions for specified client ID
target-entity:b108bbc9-538e-403b-9faf-e5cd874eb17f:read: Request permission 'read' for specified client ID
Building, releasing and versioning
The project can be built by running Build.ps1
. It uses Microsoft.CodeAnalysis.PublicApiAnalyzers to help detect public API breaking changes. Use the built-in roslyn analyzer to ensure that public APIs are declared in PublicAPI.Shipped.txt
, and obsolete public APIs in PublicAPI.Unshipped.txt
.
A new preview NuGet package is automatically published on any new commit on the main branch. This means that by completing a pull request, you automatically get a new NuGet package.
When you are ready to officially release a stable NuGet package by following the SemVer guidelines, simply manually create a tag with the format x.y.z
. This will automatically create and publish a NuGet package for this version.
License
Copyright © 2023, Workleap. This code is licensed under the Apache License, Version 2.0. You may obtain a copy of this license at https://github.com/gsoft-inc/gsoft-license/blob/master/LICENSE.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 is compatible. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net6.0
- Microsoft.AspNetCore.Authentication.JwtBearer (>= 6.0.0)
- Swashbuckle.AspNetCore (>= 6.7.0)
-
net8.0
- Microsoft.AspNetCore.Authentication.JwtBearer (>= 8.0.0)
- Swashbuckle.AspNetCore (>= 6.7.0)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2.1.1-preview.21 | 41 | 11/22/2024 |
2.1.1-preview.20 | 40 | 10/28/2024 |
2.1.1-preview.19 | 33 | 10/28/2024 |
2.1.1-preview.18 | 34 | 10/28/2024 |
2.1.1-preview.17 | 35 | 10/28/2024 |
2.1.1-preview.16 | 37 | 10/28/2024 |
2.1.1-preview.15 | 35 | 10/28/2024 |
2.1.1-preview.14 | 41 | 10/28/2024 |
2.1.1-preview.13 | 35 | 10/28/2024 |
2.1.1-preview.11 | 43 | 10/7/2024 |
2.1.1-preview.10 | 44 | 10/1/2024 |
2.1.1-preview.9 | 47 | 9/30/2024 |
2.1.1-preview.8 | 48 | 9/27/2024 |
2.1.1-preview.7 | 43 | 9/27/2024 |
2.1.1-preview.6 | 56 | 9/13/2024 |
2.1.1-preview.5 | 48 | 9/13/2024 |
2.1.1-preview.4 | 50 | 9/13/2024 |
2.1.1-preview.3 | 85 | 9/13/2024 |
2.1.1-preview.2 | 71 | 8/27/2024 |
2.1.1-preview.1 | 47 | 8/27/2024 |
2.1.0 | 5,740 | 8/19/2024 |
2.0.1-preview.6 | 69 | 8/19/2024 |
2.0.1-preview.5 | 70 | 8/13/2024 |
2.0.1-preview.4 | 44 | 8/5/2024 |
2.0.1-preview.3 | 35 | 8/5/2024 |
2.0.1-preview.2 | 45 | 7/23/2024 |
2.0.1-preview.1 | 48 | 7/23/2024 |
2.0.0 | 1,859 | 7/22/2024 |
1.3.1-preview.8 | 49 | 7/15/2024 |
1.3.1-preview.7 | 37 | 7/5/2024 |
1.3.1-preview.6 | 50 | 7/3/2024 |
1.3.1-preview.5 | 53 | 6/25/2024 |
1.3.1-preview.4 | 64 | 6/20/2024 |
1.3.1-preview.3 | 53 | 6/14/2024 |
1.3.1-preview.2 | 59 | 6/10/2024 |
1.3.1-preview.1 | 55 | 6/10/2024 |
1.3.0 | 15,742 | 5/22/2024 |
1.2.4-preview.2 | 64 | 5/22/2024 |
1.2.4-preview.1 | 51 | 5/21/2024 |
1.2.3 | 2,704 | 5/14/2024 |
1.2.3-preview.8 | 51 | 5/14/2024 |
1.2.3-preview.7 | 61 | 5/10/2024 |
1.2.3-preview.6 | 53 | 5/3/2024 |
1.2.3-preview.5 | 71 | 4/16/2024 |
1.2.3-preview.4 | 60 | 4/15/2024 |
1.2.3-preview.3 | 65 | 4/12/2024 |
1.2.3-preview.2 | 61 | 4/3/2024 |
1.2.3-preview.1 | 63 | 4/3/2024 |
1.2.2 | 6,133 | 3/26/2024 |
1.2.1 | 104 | 3/26/2024 |
1.2.1-preview.17 | 59 | 3/26/2024 |
1.2.1-preview.16 | 62 | 3/26/2024 |
1.2.1-preview.15 | 56 | 3/8/2024 |
1.2.1-preview.14 | 68 | 3/7/2024 |
1.2.1-preview.13 | 69 | 3/4/2024 |
1.2.1-preview.12 | 67 | 3/1/2024 |
1.2.1-preview.11 | 59 | 2/16/2024 |
1.2.1-preview.10 | 65 | 2/12/2024 |
1.2.1-preview.9 | 70 | 2/6/2024 |
1.2.1-preview.8 | 62 | 2/6/2024 |
1.2.1-preview.7 | 60 | 2/2/2024 |
1.2.1-preview.6 | 64 | 2/2/2024 |
1.2.1-preview.4 | 60 | 1/22/2024 |
1.2.1-preview.3 | 66 | 1/12/2024 |
1.2.1-preview.2 | 63 | 1/12/2024 |
1.2.1-preview.1 | 82 | 12/18/2023 |
1.2.0 | 12,218 | 12/14/2023 |
1.1.4-preview.1 | 71 | 12/14/2023 |
1.1.3 | 2,227 | 12/5/2023 |
1.1.3-preview.11 | 84 | 12/4/2023 |
1.1.3-preview.10 | 90 | 11/26/2023 |
1.1.3-preview.9 | 76 | 11/20/2023 |
1.1.3-preview.8 | 67 | 11/17/2023 |
1.1.3-preview.7 | 75 | 11/13/2023 |
1.1.3-preview.6 | 68 | 11/13/2023 |
1.1.3-preview.5 | 73 | 11/7/2023 |
1.1.3-preview.4 | 79 | 10/30/2023 |
1.1.3-preview.3 | 86 | 10/20/2023 |
1.1.3-preview.2 | 79 | 10/17/2023 |
1.1.3-preview.1 | 82 | 10/13/2023 |
1.1.2 | 8,589 | 10/4/2023 |
1.1.2-preview.9 | 73 | 9/28/2023 |
1.1.2-preview.8 | 82 | 9/26/2023 |
1.1.2-preview.7 | 81 | 9/25/2023 |
1.1.2-preview.6 | 81 | 9/25/2023 |
1.1.2-preview.5 | 65 | 9/21/2023 |
1.1.2-preview.4 | 83 | 9/20/2023 |
1.1.2-preview.3 | 71 | 9/20/2023 |
1.1.2-preview.2 | 74 | 9/20/2023 |
1.1.1 | 1,261 | 8/11/2023 |
1.1.1-preview.5 | 88 | 8/11/2023 |