ASP.NET Core AD 域登錄 (轉載)
在選擇AD登錄時,其實可以直接選擇 Windows 授權,不過因為有些網站需要的是LDAP獲取信息進行授權,而非直接依賴Web Server自帶的Windows 授權功能。
當然如果使用的是Azure AD/企業賬號登錄時,直接在ASP.NET Core創建項目時選擇就好了。
來個ABC:
1.新建一個ASP.NET Core項目ABC
2.Nuget引用dependencies / 修改 project.json
Novell.Directory.Ldap.NETStandard
Microsoft.AspNetCore.Authentication.Cookies
版本如下:
"Novell.Directory.Ldap.NETStandard": "2.3.5", "Microsoft.AspNetCore.Authentication.Cookies": "1.1.0"
本文的AD登錄使用的是第三方的
Novell.Directory.Ldap.NETStandard 進行的LDAP操作(還沒有看這個LDAP的庫是否有安全性問題,如果有需要修改或更換)
3.建立一個LDAP操作的工具類
代碼在下面,基本上就2個方法:
Register是獲取基本配置信息的
Validate是來驗證用戶名密碼的
using System; using Microsoft.Extensions.Configuration; using Novell.Directory.Ldap; namespace Demo { public class LDAPUtil {public static string Host { get; private set; } public static string BindDN { get; private set; } public static string BindPassword { get; private set; } public static int Port { get; private set; } public static string BaseDC { get; private set; } publicstatic string CookieName { get; private set; } public static void Register(IConfigurationRoot configuration) { Host = configuration.GetValue<string>("LDAPServer"); Port = configuration?.GetValue<int>("LDAPPort") ?? 389; BindDN = configuration.GetValue<string>("BindDN"); BindPassword = configuration.GetValue<string>("BindPassword"); BaseDC = configuration.GetValue<string>("LDAPBaseDC"); CookieName = configuration.GetValue<string>("CookieName"); } public static bool Validate(string username, string password) { try { using (var conn = new LdapConnection()) { conn.Connect(Host, Port); conn.Bind($"{BindDN},{BaseDC}", BindPassword); var entities = conn.Search(BaseDC,LdapConnection.SCOPE_SUB, $"(sAMAccountName={username})", new string[] { "sAMAccountName" }, false); string userDn = null; while (entities.hasMore()) { var entity = entities.next(); var account = entity.getAttribute("sAMAccountName"); //If you need to Case insensitive, please modify the below code. if (account != null && account.StringValue == username) { userDn = entity.DN; break; } } if (string.IsNullOrWhiteSpace(userDn)) return false; conn.Bind(userDn, password); // LdapAttribute passwordAttr = new LdapAttribute("userPassword", password); // var compareResult = conn.Compare(userDn, passwordAttr); conn.Disconnect(); return true; } } catch (LdapException) { return false; } catch (Exception) { return false; } } } }
4.在applicationSettings.json中添加基本的域配置
"LDAPServer": "192.168.1.1",//域服務器 "LDAPPort": 389,//端口,一般默認就是這個 "CookieName": "testcookiename",//使用Cookie登錄的Cookie的Key "BindDN": "CN=DoWebUser,CN=Users",//用來獲取LDAP的信息用戶的用戶名 "BindPassword": "!DoWebUserPassword",//用來獲取LDAP的信息的用戶的密碼,即DoWebUser的密碼 "LDAPBaseDC": "DC=aspnet,DC=com",//域的DC
5.Startup.cs中修改
Startup方法中:
LDAPUtil.Register(Configuration);
ConfigureServices 方法中:
services.AddAuthorization(options =>{});
Configure方法中:
app.UseCookieAuthentication(new CookieAuthenticationOptions() { AuthenticationScheme = Configuration.GetValue<string>("CookieName"), LoginPath = new PathString("/Account/Login/"), AccessDeniedPath = new PathString("/Account/Login/"), AutomaticAuthenticate = true, AutomaticChallenge = true });
6.AccountController中添加登錄和註銷的Action
登錄的頁面:
[AllowAnonymous] public IActionResult Login() { return View(); }
登錄的Post頁面:
[HttpPost] [AllowAnonymous] public async Task<IActionResult> Login(string u, string p) { if (LDAPUtil.Validate(u, p)) { var identity = new ClaimsIdentity(new MyIdentity(u));//這個MyIdentity只是一個祼的IIdentity的實現的類 var principal = new ClaimsPrincipal(identity); await HttpContext.Authentication.SignInAsync(LDAPUtil.CookieName, principal); return RedirectToAction("Index", "Home"); } return View(); }
註銷的頁面:
[Authorize] public async Task<IActionResult> Logout() { await HttpContext.Authentication.SignOutAsync(LDAPUtil.CookieName); return RedirectToAction("Index", "Home"); }
Demo
https://github.com/chsword/aspnet-core-ad-authentication
引用
https://github.com/dsbenghe/Novell.Directory.Ldap.NETStandard
https://www.nuget.org/packages/Microsoft.AspNetCore.Authentication.Cookies/
原文鏈接
ASP.NET Core AD 域登錄 (轉載)