I am trying to build multiple small ASP.Net core Mvc services that connect to a Identity server built using IdentityServer4.
I have setup the OpenIdOption on the MVC se
You seem to misunderstand what that /signin-oidc
route is for. The general flow works like this:
"Cookies"
, to authenticate.
"oidc"
, to perform an authentication challenge.
/signin-oidc
which is the remote sign-in address for the OpenId Connect authentication handler./signin-oidc
route and retrieves the user information from the sign-in request that was made by Identity Server.So the /signin-oidc
endpoint is the way to return back to your application to complete the sign-in process of the OpenId Connect authentication flow. By the time the user reaches this address, they have already signed in on the Identity Server and they are being redirected back to the application to continue where they originally left off.
Usually, the time the user spends on that route is minimal since it will redirect back into a “proper” application route immediately after the sign-in request has been processed.
So no, there will be no login form here. The login process itself is the responsibility of your OpenId Connect authentication provider, your Identity Server. That’s the whole point about this, so you e.g. login securely on google.com
with your Google credentials instead of on my-random-and-probably-untrusted-app.example.com
which definitely should not get hold of your actual Google credentials.