无法在ASP.NET Core 2应用程序上注销identityserver4的OpenIdConnect身份验证

Kev*_*ang 4 identityserver4 asp.net-core-2.0

我的Identity Server使用identityserver4框架(http:// localhost:9000).我在Identity Server上注册客户端,如下所示.

clients.Add(
     new Client
     {
         ClientId = "customer.api",
         ClientName = "Customer services",
         AllowedGrantTypes = GrantTypes.HybridAndClientCredentials,
         RequireConsent = false,
         AllowAccessTokensViaBrowser = true,

         RedirectUris = { "http://localhost:60001/signin-oidc" },
         PostLogoutRedirectUris = { "http://localhost:60001/signout-callback-oidc" },
         ClientSecrets = new List<Secret>
         {
             new Secret("testsecret".Sha256())
         },
         AllowedScopes = new List<string>
         {
             IdentityServerConstants.StandardScopes.OpenId,
             IdentityServerConstants.StandardScopes.Profile,
             IdentityServerConstants.StandardScopes.Email,
             IdentityServerConstants.StandardScopes.OfflineAccess,
             "customerprivatelinesvn.api",                        
         },
         AllowOfflineAccess = true,
         AlwaysIncludeUserClaimsInIdToken = true,
         AllowedCorsOrigins = { "http://localhost:60001" }
     });  
Run Code Online (Sandbox Code Playgroud)

这是我的客户端应用程序上的身份验证(http:// localhost:60001).

private void AddAuthentication(IServiceCollection services)
{
    JwtSecurityTokenHandler.DefaultInboundClaimTypeMap.Clear();

    services.AddAuthentication(options =>
    {
        options.DefaultAuthenticateScheme = "Cookies";
        options.DefaultChallengeScheme = "oidc";       
    })
    .AddCookie()
    .AddOpenIdConnect("oidc", options =>
    {
        Configuration.GetSection("OpenIdConnect").Bind(options);        
    });    
}    

"OpenIdConnect": {
    "SignInScheme": "Cookies",
    "Authority": "http://localhost:9000/",
    "RequireHttpsMetadata": false,
    "ClientId": "customer.api",
    "ClientSecret": "testsecret",
    "Scope": [ "customerprivatelinesvn.api", "offline_access" ],
    "CallbackPath": "/signin-oidc",
    "ResponseType": "code id_token token",
    "GetClaimsFromUserInfoEndpoint": true,
    "SaveTokens": true
  }
Run Code Online (Sandbox Code Playgroud)

HomeController的客户端应用程序

[Authorize]
public class HomeController : Controller
{
    public IActionResult Index()
    {
        return View();
    }    
}
Run Code Online (Sandbox Code Playgroud)

以下是用户登录后的客户端应用程序Cookie. 在此输入图像描述

我尝试实施如下的退出操作

public class AccountController : Controller
{
    public async Task<IActionResult> Signout()
    {
        await HttpContext.SignOutAsync("Cookies");
        await HttpContext.SignOutAsync("oidc");

        return RedirectToAction("Index", "Home");                  
    }
}
Run Code Online (Sandbox Code Playgroud)

但是当用户注销时,它不会调用身份服务器的endsession端点.我看看小提琴手的流量,没有要求身份识别服务器.

在此输入图像描述

我的期望是当用户注销时,它将调用身份服务器的endsession端点并重定向到身份服务器的注销链接,如下所示.

在此输入图像描述

在此输入图像描述

我们可以通过调用OwinContext注销在MVC应用程序上轻松完成此操作

private void LogoutOwin(IOwinContext context)
        {
            context.Authentication.SignOut();
        }
Run Code Online (Sandbox Code Playgroud)

但是,注销方法在ASP.NET Core 2上不再起作用.

注意:我正在调用AJAX帖子中的注销操作,因为我的客户端应用程序是角度5 app.

有谁知道如何在ASP.NET Core 2上正确实现注销?

非常感谢你.

问候,

凯文

Kev*_*ang 11

我现在可以解决我的问题.

1)返回SignOutResult将调用endsession端点.

2)更改AJAX帖子以提交表单.

public class AccountController : Controller
{
    public IActionResult Signout()
    {
        return new SignOutResult(new[] { "oidc", "Cookies" });            
    }
}


<form action="/Account/Signout" id="signoutForm" method="post" novalidate="novalidate">
    <ul class="nav navbar-nav navbar-right">
        <li><a href="javascript:document.getElementById('signoutForm').submit()">Sign out</a></li>
    </ul>
</form>
Run Code Online (Sandbox Code Playgroud)


alh*_*hpe 8

在 Net Core 2.0 上更改您的代码以使用枚举 CookieAuthenticationDefaults 和 OpenIdConnectDefaults

    services.AddAuthentication(options =>
        {
            options.DefaultScheme = CookieAuthenticationDefaults.AuthenticationScheme;
            options.DefaultChallengeScheme = OpenIdConnectDefaults.AuthenticationScheme;
        })
        .AddCookie()
        .AddOpenIdConnect(SetOpenIdConnectOptions);


private static void SetOpenIdConnectOptions(OpenIdConnectOptions options)
{
    options.ClientId = "auAuthApp_implicit";
    options.Authority = "http://localhost:55379/";

    options.SignInScheme = "Cookies";
    options.RequireHttpsMetadata = false;

    options.SaveTokens = true;
    options.ResponseType = "id_token token";
    options.GetClaimsFromUserInfoEndpoint = true;

}
Run Code Online (Sandbox Code Playgroud)

和...

public async Task<IActionResult> Logout()
{
    await HttpContext.SignOutAsync(CookieAuthenticationDefaults.AuthenticationScheme);
    await HttpContext.SignOutAsync(OpenIdConnectDefaults.AuthenticationScheme);

    return RedirectToAction("Index", "Home");
}
Run Code Online (Sandbox Code Playgroud)


Wil*_*lco 6

要允许注销,请使用以下注销操作:

public async Task Logout()
{
    await HttpContext.SignOutAsync("Cookies");
    await HttpContext.SignOutAsync("oidc");
}
Run Code Online (Sandbox Code Playgroud)

这正是快速入门所说的(http://docs.identityserver.io/en/release/quickstarts/3_interactive_login.html).你(和我)太聪明了.我查看了教程中的操作,并认为"这不完整,它不会返回操作结果,让我们重定向回我的页面".

实际上会发生什么是HttpContext.SignOutAsync("oidc");设置默认的ActionResult(它将重定向到OpenIdConnect提供程序以完成注销).通过指定您自己的方式return RedirectToAction("Index", "Home");覆盖它,因此注销操作永远不会发生.

注销后重定向

这个答案来看,在注销完成后指定重定向URL的方法是使用AuthenticationProperties

public async Task Logout()
{
   await context.SignOutAsync("Cookies");
   var prop = new AuthenticationProperties
   {
       RedirectUri = "/logout-complete"
   };
   // after signout this will redirect to your provided target
   await context.SignOutAsync("oidc", prop);
}
Run Code Online (Sandbox Code Playgroud)