Tim*_*ame 5 c# authorization jwt keycloak asp.net-core
我有一个使用 .NET Core API、Keycloak 和 JWT 令牌制作的应用程序。
到目前为止,我一直在使用旧版本的 Keycloak,当它创建 JWT 令牌时,它在有效负载上写下了角色:
{
"user_roles": [
"offline_access",
"uma_authorization",
"admin",
"create-realm"
]
}
Run Code Online (Sandbox Code Playgroud)
但是现在在我更新它之后,它在有效载荷上写了这里的角色:
{
"realm_access": {
"roles": [
"create-realm",
"teacher",
"offline_access",
"admin",
"uma_authorization"
]
},
}
Run Code Online (Sandbox Code Playgroud)
而且我需要知道如何将这个旧代码更改为新代码,告诉它不要看user_roles
,但要看realm_access
然后到roles
。
public void AddAuthorization(IServiceCollection services)
{
services.AddAuthorization(options =>
{
options.AddPolicy("Administrator", policy => policy.RequireClaim("user_roles", "admin"));
options.AddPolicy("Teacher", policy => policy.RequireClaim("user_roles", "teacher"));
options.AddPolicy("Pupil", policy => policy.RequireClaim("user_roles", "pupil"));
options.AddPolicy(
"AdminOrTeacher",
policyBuilder => policyBuilder.RequireAssertion(
context => context.User.HasClaim(claim =>
claim.Type == "user_roles" && (claim.Value == "admin" || claim.Value == "teacher")
))
);
});
}
Run Code Online (Sandbox Code Playgroud)
Tho*_*ann 12
以下代码将“realm_access.roles”-claim (JWT Token) 从 Keycloak (v4.7.0) 转换为 Microsoft Identity Model 角色声明:
public void ConfigureServices(IServiceCollection services)
{
...
services.AddTransient<IClaimsTransformation, ClaimsTransformer>();
...
}
public class ClaimsTransformer : IClaimsTransformation
{
public Task<ClaimsPrincipal> TransformAsync(ClaimsPrincipal principal)
{
ClaimsIdentity claimsIdentity = (ClaimsIdentity)principal.Identity;
// flatten realm_access because Microsoft identity model doesn't support nested claims
// by map it to Microsoft identity model, because automatic JWT bearer token mapping already processed here
if (claimsIdentity.IsAuthenticated && claimsIdentity.HasClaim((claim) => claim.Type == "realm_access"))
{
var realmAccessClaim = claimsIdentity.FindFirst((claim) => claim.Type == "realm_access");
var realmAccessAsDict = JsonConvert.DeserializeObject<Dictionary<string, string[]>>(realmAccessClaim.Value);
if (realmAccessAsDict["roles"] != null)
{
foreach (var role in realmAccessAsDict["roles"])
{
claimsIdentity.AddClaim(new Claim(ClaimTypes.Role, role));
}
}
}
return Task.FromResult(principal);
}
}
Run Code Online (Sandbox Code Playgroud)
归档时间: |
|
查看次数: |
2316 次 |
最近记录: |