How to use System.IdentityModel in own client-server application

前端 未结 2 796
天命终不由人
天命终不由人 2021-01-31 12:02

I\'ve got a simple client-server application based on TcpClient/TcpListener and SslStream. Clients can authenticate themselves to the server using a X509Certificate or by sendin

相关标签:
2条回答
  • 2021-01-31 12:25

    I don't have the reputation to post a comment to the existing solution, but I'd like to post the new URLs to the blogs listed in the solution, since those don't work anymore. If someone can change this to a comment, I'd be much obliged.

    • Claims
    • Claim Sets
    • Inspecting Claim Sets
    • Windows and X509 Certificate claim sets
    • Typical operations on claim sets
    • Authorization policies, context and claims transformation
    • Claims transformation in WCF
    • Authorization Context and Claims Transformation outside of WCF
    0 讨论(0)
  • 2021-01-31 12:28

    My Google foo was indeed weak. The answer is right behind the link in my question. So here are a couple of links to this blog in case somebody has the same question eventually.

    First, you should try to understand "that claim set stuff":

    • Claims
    • Claim Sets
    • Inspecting Claim Sets
    • Windows and X509Certificate Claim Sets
    • Typical Operations on Claim Sets

    Then, you need to know where claim sets come from:

    • Authorization Policies, Context and Claims Transformation
    • Claims Transformation in WCF
    • Authorization Context and Claims Transformation outside of WCF

    Armed with this knowledge, it actually becomes quite simple.

    If I understand it correctly, the basic workflow would be something like this:

    1. Client creates a SecurityToken using a SecurityTokenProvider
    2. Client serializes the SecurityToken using a SecurityTokenSerializer
    3. Server deserializes the SecurityToken using a SecurityTokenSerializer
    4. Server creates IAuthorizationPolicys using a SecurityTokenAuthenticator
    5. Server creates AuthorizationContext from IAuthorizationPolicys
    6. Done

    Example:

    // Create the SecurityTokenProvider
    var p = new UserNameSecurityTokenProvider("username", "password");
    
    // Get the SecurityToken from the SecurityTokenProvider
    var t = p.GetToken(TimeSpan.FromSeconds(1.0)) as UserNameSecurityToken;
    
    // ... transmit SecurityToken to server ...
    
    // Create the SecurityTokenAuthenticator
    var a = new CustomUserNameSecurityTokenAuthenticator(
        UserNamePasswordValidator.None);
    
    // Create IAuthorizationPolicies from SecurityToken
    var i = a.ValidateToken(t);
    
    // Create AuthorizationContext from IAuthorizationPolicies
    var c = AuthorizationContext.CreateDefaultAuthorizationContext(i);
    ShowClaims(c.ClaimSets);
    

    For X509SecurityTokens use a X509SecurityTokenProvider/Authenticator. For WindowsSecurityTokens there's a WindowsSecurityTokenAuthenticator but not a provider; instead, use the WindowsSecurityToken constructor:

    var t = new WindowsSecurityToken(WindowsIdentity.GetCurrent());
    

    This works quite well. The only thing I omitted so far above is the token serialization. There is a SecurityTokenSerializer class which has one implementation in the .NET framework: the WSSecurityTokenSerializer class which comes with WCF.

    Serializing UserNameSecurityTokens and X509SecurityTokens works like a charm (haven't tried deserialization), but WindowsSecurityTokens are apparently not supported by the serializer. This leaves me with the two authentication methods that I already have (certificates and username/password) and, as I didn't want that AuthorizationContext anyway, I'll stick with what I have :)

    0 讨论(0)
提交回复
热议问题