And*_*rey 20 asp.net asp.net-mvc asp.net-identity
默认情况下,VS 2015中的ASP.NET身份使用字符串作为AspNet***表的主键.我想改用int-typed id.经过一些研究后发现,开箱即用的框架支持不同类型的id.在下面的答案中,我将展示为实现这一目标所做的更改.
更新:在添加我的答案后,我在asp.net网站上发现了这篇博文,描述了相同但更全面的内容:http://www.asp.net/identity/overview/extensibility/change-primary-key-for-users-在-ASPNET身份
And*_*rey 35
IdentityModels.cs 改为:
// New derived classes
public class UserRole : IdentityUserRole<int>
{
}
public class UserClaim : IdentityUserClaim<int>
{
}
public class UserLogin : IdentityUserLogin<int>
{
}
public class Role : IdentityRole<int, UserRole>
{
public Role() { }
public Role(string name) { Name = name; }
}
public class UserStore : UserStore<ApplicationUser, Role, int,
UserLogin, UserRole, UserClaim>
{
public UserStore(ApplicationDbContext context): base(context)
{
}
}
public class RoleStore : RoleStore<Role, int, UserRole>
{
public RoleStore(ApplicationDbContext context): base(context)
{
}
}
// You can add profile data for the user by adding more properties to your ApplicationUser class, please visit http://go.microsoft.com/fwlink/?LinkID=317594 to learn more.
public class ApplicationUser : IdentityUser<int, UserLogin, UserRole, UserClaim>
{
public DateTime? ActiveUntil;
public async Task<ClaimsIdentity> GenerateUserIdentityAsync(ApplicationUserManager manager)
{
// Note the authenticationType must match the one defined in CookieAuthenticationOptions.AuthenticationType
var userIdentity = await manager.CreateIdentityAsync(this, DefaultAuthenticationTypes.ApplicationCookie);
// Add custom user claims here
return userIdentity;
}
}
public class ApplicationDbContext : IdentityDbContext<ApplicationUser, Role, int,
UserLogin, UserRole, UserClaim>
{
public ApplicationDbContext()
: base("DefaultConnection")
{
}
public static ApplicationDbContext Create()
{
return new ApplicationDbContext();
}
}
Run Code Online (Sandbox Code Playgroud)在`App_Start\IdentityConfig.cs中,更改以下类:
public class ApplicationUserManager : UserManager<ApplicationUser, int>
{
public ApplicationUserManager(IUserStore<ApplicationUser, int> store)
: base(store)
{
}
public static ApplicationUserManager Create(IdentityFactoryOptions<ApplicationUserManager> options, IOwinContext context)
{
var manager = new ApplicationUserManager(new UserStore(context.Get<ApplicationDbContext>()));
// Configure validation logic for usernames
manager.UserValidator = new UserValidator<ApplicationUser, int>(manager)
{
AllowOnlyAlphanumericUserNames = false,
RequireUniqueEmail = true
};
// Configure validation logic for passwords
manager.PasswordValidator = new PasswordValidator
{
RequiredLength = 8,
// RequireNonLetterOrDigit = true,
RequireDigit = true,
RequireLowercase = true,
RequireUppercase = true,
};
// Configure user lockout defaults
manager.UserLockoutEnabledByDefault = true;
manager.DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5);
manager.MaxFailedAccessAttemptsBeforeLockout = 5;
// Register two factor authentication providers. This application uses Phone and Emails as a step of receiving a code for verifying the user
// You can write your own provider and plug it in here.
manager.RegisterTwoFactorProvider("Phone Code", new PhoneNumberTokenProvider<ApplicationUser, int>
{
MessageFormat = "Your security code is {0}"
});
manager.RegisterTwoFactorProvider("Email Code", new EmailTokenProvider<ApplicationUser, int>
{
Subject = "Security Code",
BodyFormat = "Your security code is {0}"
});
manager.EmailService = new EmailService();
manager.SmsService = new SmsService();
var dataProtectionProvider = options.DataProtectionProvider;
if (dataProtectionProvider != null)
{
manager.UserTokenProvider =
new DataProtectorTokenProvider<ApplicationUser, int>(dataProtectionProvider.Create("ASP.NET Identity"));
}
return manager;
}
}
// Configure the application sign-in manager which is used in this application.
public class ApplicationSignInManager : SignInManager<ApplicationUser, int>
{
public ApplicationSignInManager(ApplicationUserManager userManager, IAuthenticationManager authenticationManager)
: base(userManager, authenticationManager)
{
}
public override Task<ClaimsIdentity> CreateUserIdentityAsync(ApplicationUser user)
{
return user.GenerateUserIdentityAsync((ApplicationUserManager)UserManager);
}
public static ApplicationSignInManager Create(IdentityFactoryOptions<ApplicationSignInManager> options, IOwinContext context)
{
return new ApplicationSignInManager(context.GetUserManager<ApplicationUserManager>(), context.Authentication);
}
}
Run Code Online (Sandbox Code Playgroud)在App_Start\Startup.Auth.cs更改OnValidateIdentity属性中:
OnValidateIdentity = SecurityStampValidator.OnValidateIdentity<ApplicationUserManager, ApplicationUser, int>(
validateInterval: TimeSpan.FromMinutes(30),
regenerateIdentityCallback: (manager, user) => user.GenerateUserIdentityAsync(manager),
getUserIdCallback: id => id.GetUserId<int>())
Run Code Online (Sandbox Code Playgroud)更改ManageController以使用新的pk类型:
替换的所有条目User.Identity.GetUserId()来User.Identity.GetUserId<int>()
可能有一些id需要更改的字符串参数int,但这就是它.
Mic*_*ida 15
根据此博客文章,使用ASP.NET Core Identity,进行以下更改:
首先,转到该Data\Migrations文件夹并删除其中的所有内容.
在Startup.cs,ConfigureServices方法中,services.AddIdentity改为
services.AddIdentity<ApplicationUser, IdentityRole<int>>()
.AddEntityFrameworkStores<ApplicationDbContext, int>()
.AddDefaultTokenProviders();
Run Code Online (Sandbox Code Playgroud)
在ApplicationDbContext.cs改变从基类IdentityDbContext<ApplicationUser>到
public class ApplicationDbContext
: IdentityDbContext<ApplicationUser, IdentityRole<int>, int>
Run Code Online (Sandbox Code Playgroud)
最后,在更改基类ApplicationUser.cs从IdentityUser到
public class ApplicationUser : IdentityUser<int>
Run Code Online (Sandbox Code Playgroud)
然后运行add-migration -o Data\Migrations和update-database.如果迁移导致任何问题,请使用VS中的Sql Server Management Studio或SqlServerObjectExplorer删除数据库(不要只使用文件系统),重新删除迁移,然后重试.