HttpContext.User.Claims 与 JWT 令牌不匹配 - “Sub”更改为“NameIdentifier”

Bro*_*Lee 2 c# jwt asp.net-core blazor blazor-server-side

我遇到以下情况,非常感谢任何帮助:

我在用户界面(Blazor 服务器应用程序)中使用 JSON Web 令牌 (jwtbearer) 进行身份验证和授权,以访问我的 Web API (Asp.net core 5.0)。

我尝试从通过 UserId 过滤的 API 返回数据(在创建令牌时我也将其添加为 NameIdentifier)。ClaimsPrincipal然后我注意到,点击控制器时返回的声明ControllerBase.User与我的令牌不同。

我有两项NameIdentifier索赔,但缺少“sub”。相反,看起来 sub 已更改为第二个NameIdentifier

调试屏幕截图 - 控制器中 this.User 的声明

但是,当我随请求发送时,令牌的有效负载看起来是正确的。这是我的令牌的有效负载:

{
  "sub": "admin@caliprog.com",
  "jti": "15c23576-9f5b-4f81-a985-ab236830c7b5",
  "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier": "9b437d6c-8fb8-455d-87f5-986d36b26dcf",
  "http://schemas.microsoft.com/ws/2008/06/identity/claims/role": "Administrator",
  "exp": 1625472724,
  "iss": "test.com",
  "aud": "test.com"
}
Run Code Online (Sandbox Code Playgroud)

显然我在某个地方犯了错误,但我不知道错误出在哪里。如果有人能指出我的方向,那就太好了。我很高兴自己做更多研究,但我不知道从哪里开始。

以下是一些可能相关的代码部分,如果我遗漏了任何重要的内容,请告诉我:

我的 GetRequest(它有效,但我很想替换this.User.Claims.ToList()[2].Valuevar userId = this.User.FindFirst(ClaimTypes.NameIdentifier).Value;

    [HttpGet]
    public async Task<IActionResult> GetWorkouts()
    {
        try
        {
            _logger.LogInfo(LogMessages.AttemptMsg, ControllerContext);

            var userId = this.User.Claims.ToList()[2].Value;
            var workouts = await _workoutRepository.FindAllByUser(userId);
            var response = _mapper.Map<IList<WorkoutDTO>>(workouts);
            _logger.LogInfo(LogMessages.SuccessActionMsg,ControllerContext);
            return Ok(response);
        }
        catch (Exception e)
        {

            return _logger.LogInternalErrorResult(e, ControllerContext);
        }
    }
Run Code Online (Sandbox Code Playgroud)

UsersController -> 登录并生成令牌:

    [Route("login")]
    [AllowAnonymous]
    [HttpPost]
    [ProducesResponseType(StatusCodes.Status200OK)]
    [ProducesResponseType(StatusCodes.Status401Unauthorized)]
    [ProducesResponseType(StatusCodes.Status500InternalServerError)]
    public async Task<IActionResult> Login([FromBody] UserDTO userDTO)
    {   
        try
        {
            var username = userDTO.EmailAddress;
            var password = userDTO.Password;

            _logger.LogInfo(string.Concat(LogMessages.AttemptMsg, $"With username: {username}."), ControllerContext);

            var result = await _signInManager.PasswordSignInAsync(username, password, false, false);

            if (result.Succeeded)
            {
                var user = await _userManager.FindByNameAsync(username);
                var tokenstring = await GenerateJSONWebToken(user);
                _logger.LogInfo(LogMessages.SuccessActionMsg, ControllerContext);
                return Ok(new { token = tokenstring});
            }
            _logger.LogInfo(string.Concat($"{username}: ", LogMessages.NotAuthenticated), ControllerContext);
            return Unauthorized(userDTO);
        }
        catch (Exception e)
        {
            return _logger.LogInternalErrorResult(e, ControllerContext);
        }
    }

    private async Task<string> GenerateJSONWebToken(IdentityUser user)
    {
        var securityKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_config["Jwt:Key"]));
        var credentials = new SigningCredentials(securityKey, SecurityAlgorithms.HmacSha256);
        var claims = new List<Claim>
        {
            new Claim(JwtRegisteredClaimNames.Sub,user.Email),
            new Claim(JwtRegisteredClaimNames.Jti,Guid.NewGuid().ToString()),
            new Claim(ClaimTypes.NameIdentifier,user.Id)
        };
        var roles = await _userManager.GetRolesAsync(user);
        claims.AddRange(roles.Select(r => new Claim(ClaimsIdentity.DefaultRoleClaimType, r)));

        var token = new JwtSecurityToken(
            _config["Jwt:Issuer"],
            _config["Jwt:Issuer"],
            claims,
            null,
            expires: DateTime.Now.AddHours(2),
            signingCredentials: credentials);

        return new JwtSecurityTokenHandler().WriteToken(token);
    }
}
Run Code Online (Sandbox Code Playgroud)

UI基础存储库

    public async Task<IList<T>> Get(string url)
    {
        var request = new HttpRequestMessage(HttpMethod.Get, url);

        var client = _client.CreateClient();
        client.DefaultRequestHeaders.Authorization =
            new AuthenticationHeaderValue("bearer", await GetBearerToken());

        HttpResponseMessage response = await client.SendAsync(request);

        if (response.StatusCode == System.Net.HttpStatusCode.OK)
        {
            var content = await response.Content.ReadAsStringAsync();
            return JsonConvert.DeserializeObject<List<T>>(content);
        }

        return null;
    }


    private async Task<string> GetBearerToken()
    {
        return await _localStorage.GetItemAsync<string>("authToken");
    }
Run Code Online (Sandbox Code Playgroud)

API 身份验证状态提供者

    public async Task LoggedIn()
    {
        var savedToken = await _localStorage.GetItemAsync<string>("authToken");
        var tokenContent = _tokenHandler.ReadJwtToken(savedToken);
        var claims = ParseClaims(tokenContent);
        var user = new ClaimsPrincipal(new ClaimsIdentity(claims, "jwt"));
        var authState = Task.FromResult(new AuthenticationState(user));
        NotifyAuthenticationStateChanged(authState);
    }

    public void LoggedOut()
    {
        var nobody = new ClaimsPrincipal(new ClaimsIdentity());
        var authState = Task.FromResult(new AuthenticationState(nobody));
        NotifyAuthenticationStateChanged(authState);
    }

    private static IList<Claim> ParseClaims(JwtSecurityToken tokenContent)
    {
        var claims = tokenContent.Claims.ToList();
        claims.Add(new Claim(ClaimTypes.Name, tokenContent.Subject));
        return claims;
    } 
Run Code Online (Sandbox Code Playgroud)

以下是一些项目细节供参考:

API
Microsoft.AspNetCore.Authentication.JwtBearer 版本=“5.0.5”
Microsoft.AspNetCore.Diagnostics.EntityFrameworkCore 版本=“5.0.5”
Microsoft.AspNetCore.Identity.EntityFrameworkCore 版本=“5.0.5”
Microsoft.AspNetCore.Identity.UI版本 =“5.0.4”
Microsoft.AspNetCore.Mvc.NewtonsoftJson 版本 =“5.0.6”

UI
Blazored.LocalStorage 版本 =“4.0.0”
Newtonsoft.Json 版本 =“13.0.1”
System.IdentityModel.Tokens.Jwt 版本=“6.11.0”

Kev*_*ith 10

在您的Startup.cs文件中,您需要更改您的ConfigureServices方法。

services.AddAuthentication(auth =>
            {
                auth.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
                auth.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
            }).AddJwtBearer(token =>
            {
                // ... Your extra options

                // Don't map the in bound claims.
                token.MapInboundClaims = false;
            });
Run Code Online (Sandbox Code Playgroud)

这将保留所有进入您的 API 的声明。

  • 我一定会阅读这篇博文!如果您这样做,您可以考虑包括一些解释,即 `.AddAuthentication` 中的第一个 lamda 表达式正在做什么。在我的第一个版本中,我只有 `services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)` 并且它有效。我有兴趣了解差异是什么。我可能并不孤单:) (2认同)