亚洲香蕉成人av网站在线观看_欧美精品成人91久久久久久久_久久久久久久久久久亚洲_热久久视久久精品18亚洲精品_国产精自产拍久久久久久_亚洲色图国产精品_91精品国产网站_中文字幕欧美日韩精品_国产精品久久久久久亚洲调教_国产精品久久一区_性夜试看影院91社区_97在线观看视频国产_68精品久久久久久欧美_欧美精品在线观看_国产精品一区二区久久精品_欧美老女人bb

首頁 > 編程 > .NET > 正文

在ASP.NET Core中實現一個Token base的身份認證實例

2024-07-10 13:31:38
字體:
來源:轉載
供稿:網友

以前在web端的身份認證都是基于Cookie | Session的身份認證, 在沒有更多的終端出現之前,這樣做也沒有什么問題,但在Web API時代,你所需要面對的就不止是瀏覽器了,還有各種客戶端,這樣就有了一個問題,這些客戶端是不知道cookie是什么鬼的。 (cookie其實是瀏覽器搞出來的小貓膩,用來保持會話的,但HTTP本身是無狀態的, 各種客戶端能提供的無非也就是HTTP操作的API)

而基于Token的身份認證就是應對這種變化而生的,它更開放,安全性也更高。

基于Token的身份認證有很多種實現方式,但我們這里只使用微軟提供的API。

接下來的例子將帶領大家完成一個使用微軟JwtSecurityTokenHandler完成一個基于beare token的身份認證。

注意:這種文章屬于Step by step教程,跟著做才不至于看暈,下載完整代碼分析代碼結構才有意義。

前期準備

推薦使用VS2015 Update3作為你的IDE

你需要安裝.NET Core的運行環境以及開發工具

創建項目

在VS中新建項目,項目類型選擇ASP.NET Core Web Application(.NET Core), 輸入項目名稱為CSTokenBaseAuth

Coding

創建一些輔助類

在項目根目錄下創建一個文件夾Auth,并添加RSAKeyHelper.cs以及TokenAuthOption.cs兩個文件

在RSAKeyHelper.cs中

using System.Security.Cryptography;namespace CSTokenBaseAuth.Auth{  public class RSAKeyHelper  {    public static RSAParameters GenerateKey()    {      using (var key = new RSACryptoServiceProvider(2048))      {        return key.ExportParameters(true);      }    }  }}

在TokenAuthOption.cs中

using System;using Microsoft.IdentityModel.Tokens;namespace CSTokenBaseAuth.Auth{  public class TokenAuthOption  {    public static string Audience { get; } = "ExampleAudience";    public static string Issuer { get; } = "ExampleIssuer";    public static RsaSecurityKey Key { get; } = new RsaSecurityKey(RSAKeyHelper.GenerateKey());    public static SigningCredentials SigningCredentials { get; } = new SigningCredentials(Key, SecurityAlgorithms.RsaSha256Signature);    public static TimeSpan ExpiresSpan { get; } = TimeSpan.FromMinutes(20);  }}

Startup.cs

在ConfigureServices中添加如下代碼:

services.AddAuthorization(auth =>{  auth.AddPolicy("Bearer", new AuthorizationPolicyBuilder()    .AddAuthenticationSchemes(JwtBearerDefaults.AuthenticationScheme‌?)    .RequireAuthenticatedUser().Build());});

完整的代碼應該是這樣

public void ConfigureServices(IServiceCollection services){  // Add framework services.  services.AddApplicationInsightsTelemetry(Configuration);  // Enable the use of an [Authorize("Bearer")] attribute on methods and classes to protect.  services.AddAuthorization(auth =>  {    auth.AddPolicy("Bearer", new AuthorizationPolicyBuilder()      .AddAuthenticationSchemes(JwtBearerDefaults.AuthenticationScheme‌?)      .RequireAuthenticatedUser().Build());  });  services.AddMvc();}

在Configure方法中添加如下代碼

app.UseExceptionHandler(appBuilder => {  appBuilder.Use(async (context, next) => {    var error = context.Features[typeof(IExceptionHandlerFeature)] as IExceptionHandlerFeature;    //when authorization has failed, should retrun a json message to client    if (error != null && error.Error is SecurityTokenExpiredException)    {      context.Response.StatusCode = 401;      context.Response.ContentType = "application/json";      await context.Response.WriteAsync(JsonConvert.SerializeObject(        new { authenticated = false, tokenExpired = true }      ));    }    //when orther error, retrun a error message json to client    else if (error != null && error.Error != null)    {      context.Response.StatusCode = 500;      context.Response.ContentType = "application/json";      await context.Response.WriteAsync(JsonConvert.SerializeObject(        new { success = false, error = error.Error.Message }      ));    }    //when no error, do next.    else await next();  });});

這段代碼主要是Handle Error用的,比如當身份認證失敗的時候會拋出異常,而這里就是處理這個異常的。

接下來在相同的方法中添加如下代碼,

app.UseExceptionHandler(appBuilder => {  appBuilder.Use(async (context, next) => {    var error = context.Features[typeof(IExceptionHandlerFeature)] as IExceptionHandlerFeature;    //when authorization has failed, should retrun a json message to client    if (error != null && error.Error is SecurityTokenExpiredException)    {      context.Response.StatusCode = 401;      context.Response.ContentType = "application/json";      await context.Response.WriteAsync(JsonConvert.SerializeObject(        new { authenticated = false, tokenExpired = true }      ));    }    //when orther error, retrun a error message json to client    else if (error != null && error.Error != null)    {      context.Response.StatusCode = 500;      context.Response.ContentType = "application/json";      await context.Response.WriteAsync(JsonConvert.SerializeObject(        new { success = false, error = error.Error.Message }      ));    }    //when no error, do next.    else await next();  });});

應用JwtBearerAuthentication

app.UseJwtBearerAuthentication(new JwtBearerOptions {  TokenValidationParameters = new TokenValidationParameters {    IssuerSigningKey = TokenAuthOption.Key,    ValidAudience = TokenAuthOption.Audience,    ValidIssuer = TokenAuthOption.Issuer,    ValidateIssuerSigningKey = true,    ValidateLifetime = true,    ClockSkew = TimeSpan.FromMinutes(0)  }});

完整的代碼應該是這樣

using System;using Microsoft.AspNetCore.Builder;using Microsoft.AspNetCore.Hosting;using Microsoft.Extensions.Configuration;using Microsoft.Extensions.DependencyInjection;using Microsoft.Extensions.Logging;using Microsoft.AspNetCore.Authorization;using Microsoft.AspNetCore.Authentication.JwtBearer;using CSTokenBaseAuth.Auth;using Microsoft.AspNetCore.Diagnostics;using Microsoft.IdentityModel.Tokens;using Microsoft.AspNetCore.Http;using Newtonsoft.Json;namespace CSTokenBaseAuth{  public class Startup  {    public Startup(IHostingEnvironment env)    {      var builder = new ConfigurationBuilder()        .SetBasePath(env.ContentRootPath)        .AddJsonFile("appsettings.json", optional: true, reloadOnChange: true)        .AddJsonFile($"appsettings.{env.EnvironmentName}.json", optional: true);      if (env.IsEnvironment("Development"))      {        // This will push telemetry data through Application Insights pipeline faster, allowing you to view results immediately.        builder.AddApplicationInsightsSettings(developerMode: true);      }      builder.AddEnvironmentVariables();      Configuration = builder.Build();    }    public IConfigurationRoot Configuration { get; }    // This method gets called by the runtime. Use this method to add services to the container    public void ConfigureServices(IServiceCollection services)    {      // Add framework services.      services.AddApplicationInsightsTelemetry(Configuration);      // Enable the use of an [Authorize("Bearer")] attribute on methods and classes to protect.      services.AddAuthorization(auth =>      {        auth.AddPolicy("Bearer", new AuthorizationPolicyBuilder()          .AddAuthenticationSchemes(JwtBearerDefaults.AuthenticationScheme‌?)          .RequireAuthenticatedUser().Build());      });      services.AddMvc();    }    // This method gets called by the runtime. Use this method to configure the HTTP request pipeline    public void Configure(IApplicationBuilder app, IHostingEnvironment env, ILoggerFactory loggerFactory)    {      loggerFactory.AddConsole(Configuration.GetSection("Logging"));      loggerFactory.AddDebug();      app.UseApplicationInsightsRequestTelemetry();      app.UseApplicationInsightsExceptionTelemetry();      #region Handle Exception      app.UseExceptionHandler(appBuilder => {        appBuilder.Use(async (context, next) => {          var error = context.Features[typeof(IExceptionHandlerFeature)] as IExceptionHandlerFeature;          //when authorization has failed, should retrun a json message to client          if (error != null && error.Error is SecurityTokenExpiredException)          {            context.Response.StatusCode = 401;            context.Response.ContentType = "application/json";            await context.Response.WriteAsync(JsonConvert.SerializeObject(              new { authenticated = false, tokenExpired = true }            ));          }          //when orther error, retrun a error message json to client          else if (error != null && error.Error != null)          {            context.Response.StatusCode = 500;            context.Response.ContentType = "application/json";            await context.Response.WriteAsync(JsonConvert.SerializeObject(              new { success = false, error = error.Error.Message }            ));          }          //when no error, do next.          else await next();        });      });      #endregion      #region UseJwtBearerAuthentication      app.UseJwtBearerAuthentication(new JwtBearerOptions {        TokenValidationParameters = new TokenValidationParameters {          IssuerSigningKey = TokenAuthOption.Key,          ValidAudience = TokenAuthOption.Audience,          ValidIssuer = TokenAuthOption.Issuer,          ValidateIssuerSigningKey = true,          ValidateLifetime = true,          ClockSkew = TimeSpan.FromMinutes(0)        }      });      #endregion      app.UseMvc(routes =>      {        routes.MapRoute(          name: "default",          template: "{controller=Login}/{action=Index}");      });    }  }}

在Controllers中新建一個Web API Controller Class,命名為TokenAuthController.cs。我們將在這里完成登錄授權

在同文件下添加兩個類,分別用來模擬用戶模型,以及用戶存儲,代碼應該是這樣

public class User{  public Guid ID { get; set; }  public string Username { get; set; }  public string Password { get; set; }}public static class UserStorage{  public static List<User> Users { get; set; } = new List<User> {    new User {ID=Guid.NewGuid(),Username="user1",Password = "user1psd" },    new User {ID=Guid.NewGuid(),Username="user2",Password = "user2psd" },    new User {ID=Guid.NewGuid(),Username="user3",Password = "user3psd" }  };}

接下來在TokenAuthController.cs中添加如下方法

private string GenerateToken(User user, DateTime expires){  var handler = new JwtSecurityTokenHandler();    ClaimsIdentity identity = new ClaimsIdentity(    new GenericIdentity(user.Username, "TokenAuth"),    new[] {      new Claim("ID", user.ID.ToString())    }  );  var securityToken = handler.CreateToken(new SecurityTokenDescriptor  {    Issuer = TokenAuthOption.Issuer,    Audience = TokenAuthOption.Audience,    SigningCredentials = TokenAuthOption.SigningCredentials,    Subject = identity,    Expires = expires  });  return handler.WriteToken(securityToken);}

該方法僅僅只是生成一個Auth Token,接下來我們來添加另外一個方法來調用它

在相同文件中添加如下代碼

[HttpPost]public string GetAuthToken(User user){  var existUser = UserStorage.Users.FirstOrDefault(u => u.Username == user.Username && u.Password == user.Password);  if (existUser != null)  {    var requestAt = DateTime.Now;    var expiresIn = requestAt + TokenAuthOption.ExpiresSpan;    var token = GenerateToken(existUser, expiresIn);    return JsonConvert.SerializeObject(new {      stateCode = 1,      requertAt = requestAt,      expiresIn = TokenAuthOption.ExpiresSpan.TotalSeconds,      accessToken = token    });  }  else  {    return JsonConvert.SerializeObject(new { stateCode = -1, errors = "Username or password is invalid" });  }}

該文件完整的代碼應該是這樣

using System;using System.Collections.Generic;using System.Linq;using System.Threading.Tasks;using Microsoft.AspNetCore.Mvc;using Newtonsoft.Json;using System.IdentityModel.Tokens.Jwt;using System.Security.Claims;using System.Security.Principal;using Microsoft.IdentityModel.Tokens;using CSTokenBaseAuth.Auth;namespace CSTokenBaseAuth.Controllers{  [Route("api/[controller]")]  public class TokenAuthController : Controller  {    [HttpPost]    public string GetAuthToken(User user)    {      var existUser = UserStorage.Users.FirstOrDefault(u => u.Username == user.Username && u.Password == user.Password);      if (existUser != null)      {        var requestAt = DateTime.Now;        var expiresIn = requestAt + TokenAuthOption.ExpiresSpan;        var token = GenerateToken(existUser, expiresIn);        return JsonConvert.SerializeObject(new {          stateCode = 1,          requertAt = requestAt,          expiresIn = TokenAuthOption.ExpiresSpan.TotalSeconds,          accessToken = token        });      }      else      {        return JsonConvert.SerializeObject(new { stateCode = -1, errors = "Username or password is invalid" });      }    }    private string GenerateToken(User user, DateTime expires)    {      var handler = new JwtSecurityTokenHandler();            ClaimsIdentity identity = new ClaimsIdentity(        new GenericIdentity(user.Username, "TokenAuth"),        new[] {          new Claim("ID", user.ID.ToString())        }      );      var securityToken = handler.CreateToken(new SecurityTokenDescriptor      {        Issuer = TokenAuthOption.Issuer,        Audience = TokenAuthOption.Audience,        SigningCredentials = TokenAuthOption.SigningCredentials,        Subject = identity,        Expires = expires      });      return handler.WriteToken(securityToken);    }  }  public class User  {    public Guid ID { get; set; }    public string Username { get; set; }    public string Password { get; set; }  }  public static class UserStorage  {    public static List<User> Users { get; set; } = new List<User> {      new User {ID=Guid.NewGuid(),Username="user1",Password = "user1psd" },      new User {ID=Guid.NewGuid(),Username="user2",Password = "user2psd" },      new User {ID=Guid.NewGuid(),Username="user3",Password = "user3psd" }    };  }}

接下來我們來完成授權驗證部分

在Controllers中新建一個Web API Controller Class,命名為ValuesController.cs

在其中添加如下代碼

public string Get(){  var claimsIdentity = User.Identity as ClaimsIdentity;  var id = claimsIdentity.Claims.FirstOrDefault(c => c.Type == "ID").Value;  return $"Hello! {HttpContext.User.Identity.Name}, your ID is:{id}";}

為方法添加裝飾屬性

[HttpGet][Authorize("Bearer")]完整的文件代碼應該是這樣using System.Linq;using Microsoft.AspNetCore.Mvc;using Microsoft.AspNetCore.Authorization;using System.Security.Claims;namespace CSTokenBaseAuth.Controllers{  [Route("api/[controller]")]  public class ValuesController : Controller  {    [HttpGet]    [Authorize("Bearer")]    public string Get()    {      var claimsIdentity = User.Identity as ClaimsIdentity;      var id = claimsIdentity.Claims.FirstOrDefault(c => c.Type == "ID").Value;      return $"Hello! {HttpContext.User.Identity.Name}, your ID is:{id}";    }  }}

最后讓我們來添加視圖

在Controllers中新建一個Web Controller Class,命名為LoginController.cs

其中的代碼應該是這樣

using Microsoft.AspNetCore.Mvc;namespace CSTokenBaseAuth.Controllers{  [Route("[controller]/[action]")]  public class LoginController : Controller  {    public IActionResult Index()    {      return View();    }  }}

在項目Views目錄下新建一個名為Login的目錄,并在其中新建一個Index.cshtml文件。

代碼應該是這個樣子

<html xmlns="http://www.w3.org/1999/xhtml"><head>  <title></title></head><body>  <button id="getToken">getToken</button>  <button id="requestAPI">requestAPI</button>  <script src="https://code.jquery.com/jquery-3.1.1.min.js"></script>  <script>    $(function () {      var accessToken = undefined;      $("#getToken").click(function () {        $.post(          "/api/TokenAuth",          { Username: "user1", Password: "user1psd" },          function (data) {            console.log(data);            if (data.stateCode == 1)            {              accessToken = data.accessToken;              $.ajaxSetup({                headers: { "Authorization": "Bearer " + accessToken }              });            }          },          "json"        );      })      $("#requestAPI").click(function () {        $.get("/api/Values", {}, function (data) {          alert(data);        }, "text");      })    })  </script></body></html>

以上就是本文的全部內容,希望對大家的學習有所幫助,也希望大家多多支持VeVb武林網。


注:相關教程知識閱讀請移步到ASP.NET教程頻道。
發表評論 共有條評論
用戶名: 密碼:
驗證碼: 匿名發表
亚洲香蕉成人av网站在线观看_欧美精品成人91久久久久久久_久久久久久久久久久亚洲_热久久视久久精品18亚洲精品_国产精自产拍久久久久久_亚洲色图国产精品_91精品国产网站_中文字幕欧美日韩精品_国产精品久久久久久亚洲调教_国产精品久久一区_性夜试看影院91社区_97在线观看视频国产_68精品久久久久久欧美_欧美精品在线观看_国产精品一区二区久久精品_欧美老女人bb
欧美日本精品在线| 亚洲一级免费视频| 亚洲天堂日韩电影| 国产精品久久久久久av福利| 在线视频亚洲欧美| 欧美又大又硬又粗bbbbb| 国内精品400部情侣激情| 亚洲xxx自由成熟| 国产精品视频一区国模私拍| 日韩精品中文字幕在线| 国产精品揄拍500视频| 久久深夜福利免费观看| 日韩中文综合网| 日本欧美在线视频| 国产成人综合精品在线| 欧美专区中文字幕| 日韩电影在线观看中文字幕| 国产做受69高潮| 国产主播在线一区| 午夜精品福利电影| 亚洲加勒比久久88色综合| 色婷婷综合久久久久中文字幕1| 国产精品男人爽免费视频1| 久久久精品网站| 欧美精品久久久久a| 日韩中文第一页| 久久久亚洲欧洲日产国码aⅴ| 久久伊人色综合| 中文一区二区视频| 2019国产精品自在线拍国产不卡| 国产精品久久久久久久一区探花| 国内精品400部情侣激情| 一本色道久久88综合亚洲精品ⅰ| 国产精品白丝jk喷水视频一区| 亚洲精品国产综合区久久久久久久| 最近2019中文字幕一页二页| 欧美怡春院一区二区三区| 中文字幕国产精品久久| 久久香蕉国产线看观看网| 国产91精品青草社区| 国产福利视频一区二区| 成人免费视频网址| 久久久久久亚洲精品中文字幕| 国产成人激情小视频| 日韩欧美成人区| 亚洲成人av在线播放| 国产不卡精品视男人的天堂| 91高清免费视频| 亚洲国产99精品国自产| 91av在线网站| 亚洲福利视频网站| 91精品久久久久久久久久久久久| 亚洲免费av电影| 欧美精品免费看| 欧美另类极品videosbestfree| 国产精品成人品| 国产成人在线精品| 奇门遁甲1982国语版免费观看高清| 国产精品久久77777| 亚洲品质视频自拍网| 亚洲成人国产精品| 2019av中文字幕| 国语对白做受69| 性欧美亚洲xxxx乳在线观看| 97成人精品视频在线观看| 美女国内精品自产拍在线播放| 日韩中文字幕国产| 久久久久久亚洲| 成人激情av在线| 欧美网站在线观看| 欧美黑人极品猛少妇色xxxxx| 51午夜精品视频| 国产精品免费看久久久香蕉| 久久久久久午夜| 欧美激情久久久久| 亚洲自拍欧美另类| 91国内精品久久| 欧美成人高清视频| 欧美尺度大的性做爰视频| 亚洲欧美日韩直播| 国产精品极品美女在线观看免费| 亚洲国产精品成人av| 亚洲电影中文字幕| 夜夜嗨av一区二区三区四区| 91精品国产高清久久久久久| 国产精品久久久久久久7电影| 国产一区二区三区日韩欧美| 国产成人综合亚洲| 成人综合国产精品| 7777精品久久久久久| 国产精品久久久久久五月尺| 日韩欧美国产黄色| 欧美黄色成人网| 亚洲电影免费观看高清完整版在线观看| 91色p视频在线| 国产精品免费看久久久香蕉| 国产精品久久久久久久电影| 色在人av网站天堂精品| 国产精品高精视频免费| 日韩视频免费在线| 日韩精品视频三区| 亚洲香蕉av在线一区二区三区| 久久精品国产电影| 在线观看不卡av| 一区二区三区视频在线| 亚洲欧美第一页| 成人午夜小视频| 欧美激情欧美激情| 日韩三级成人av网| 欧美xxxx做受欧美.88| 欧美日韩第一视频| 欧美激情免费观看| 日本三级韩国三级久久| 美日韩精品视频免费看| 欧美精品福利在线| 国产精品丝袜一区二区三区| 日韩av在线导航| 日本久久中文字幕| 欧美色视频日本高清在线观看| 久热精品在线视频| 中文字幕在线看视频国产欧美在线看完整| 日韩亚洲成人av在线| 亚洲 日韩 国产第一| 国产精品丝袜久久久久久高清| 亚洲精品女av网站| 亚洲另类欧美自拍| 国产精品av在线播放| 国产精品视频最多的网站| 深夜福利亚洲导航| 欧美亚洲另类视频| 国产精品18久久久久久首页狼| 亚洲精品中文字幕女同| 欧美最顶级丰满的aⅴ艳星| 成人春色激情网| 欧美日韩午夜剧场| 国产97在线亚洲| 亚洲国产精品va| 亚洲精品乱码久久久久久金桔影视| 8x拔播拔播x8国产精品| 久久伊人精品天天| 久久久女人电视剧免费播放下载| 久久精品福利视频| 九九九热精品免费视频观看网站| 国产精品久久久久久久久免费看| 操91在线视频| 国产视频一区在线| 精品国产91久久久| 尤物99国产成人精品视频| 欧美亚洲视频在线看网址| 5566成人精品视频免费| 国产精品电影网站| 日本欧美黄网站| 欧美成人一区二区三区电影| 92国产精品视频| 亚洲va欧美va国产综合久久| 国模精品视频一区二区三区| 国模精品视频一区二区| 中文字幕av一区二区| 国产精品h片在线播放| 亚洲精品视频久久| 高清一区二区三区日本久| 国产日韩在线观看av| 色偷偷av亚洲男人的天堂| 青青青国产精品一区二区|