首頁 > 軟體

ASP.NET的Core AD域登入過程範例

2022-04-02 13:00:38

在選擇AD登入時,其實可以直接選擇 Windows 授權,不過因為有些網站需要的是LDAP獲取資訊進行授權,而非直接依賴Web Server自帶的Windows 授權功能。

當然如果使用的是Azure AD/企業賬號登入時,直接在ASP.NET Core建立專案時選擇就好了。

來個ABC:

新建一個ASP.NET Core專案

Nuget參照dependencies / 修改```project.json```

Novell.Directory.Ldap.NETStandard

Microsoft.AspNetCore.Authentication.Cookies

版本如下:

"Novell.Directory.Ldap.NETStandard": "2.3.5",

"Microsoft.AspNetCore.Authentication.Cookies": "1.1.0"

本文的AD登入使用的是第三方的

```Novell.Directory.Ldap.NETStandard``` 進行的LDAP操作(還沒有看這個LDAP的庫是否有安全性問題,如果有需要修改或更換)

建立一個LDAP操作的工具類

程式碼在下面連結中,就不單獨貼了,基本上就2個方法:

Register是獲取基本設定資訊的

Validate是來驗證使用者名稱密碼的

using System;
using Microsoft.Extensions.Configuration;
using Novell.Directory.Ldap;
namespace Demo
{
    public class LDAPUtil
    {
        public static string Host { get; private set; }
        public static string BindDN { get; private set; }
        public static string BindPassword { get; private set; }
        public static int Port { get; private set; }
        public static string BaseDC { get; private set; }
        public static string CookieName { get; private set; }
        public static void Register(IConfigurationRoot configuration)
        {
            Host = configuration.GetValue<string>("LDAPServer");
            Port = configuration?.GetValue<int>("LDAPPort") ?? 389;
            BindDN = configuration.GetValue<string>("BindDN");
            BindPassword = configuration.GetValue<string>("BindPassword");
            BaseDC = configuration.GetValue<string>("LDAPBaseDC");
            CookieName = configuration.GetValue<string>("CookieName");
        }
        public static bool Validate(string username, string password)
        {
            try
            {
                using (var conn = new LdapConnection())
                {
                    conn.Connect(Host, Port);
                    conn.Bind($"{BindDN},{BaseDC}", BindPassword);
                    var entities =
                        conn.Search(BaseDC,LdapConnection.SCOPE_SUB,
                            $"(sAMAccountName={username})",
                            new string[] { "sAMAccountName" }, false);
                    string userDn = null;
                    while (entities.hasMore())
                    {
                        var entity = entities.next();
                        var account = entity.getAttribute("sAMAccountName");
                        //If you need to Case insensitive, please modify the below code.
                        if (account != null && account.StringValue == username)
                        {
                            userDn = entity.DN;
                            break;
                        }
                    }
                    if (string.IsNullOrWhiteSpace(userDn)) return false;
                    conn.Bind(userDn, password);
                    // LdapAttribute passwordAttr = new LdapAttribute("userPassword", password);
                    // var compareResult = conn.Compare(userDn, passwordAttr);
                    conn.Disconnect();
                    return true;
                }
            }
            catch (LdapException)
            {
               
                return false;
            }
            catch (Exception)
            { 
                return false;
            }
        }

    }
}

在applicationSettings.json中新增基本的域設定

"LDAPServer": "192.168.1.1",//域伺服器

"LDAPPort": 389,//埠,一般預設就是這個

"CookieName": "testcookiename",//使用Cookie登入的Cookie的Key

"BindDN": "CN=DoWebUser,CN=Users",//用來獲取LDAP的資訊使用者的使用者名稱

"BindPassword": "!DoWebUserPassword",//用來獲取LDAP的資訊的使用者的密碼,即DoWebUser的密碼

"LDAPBaseDC": "DC=aspnet,DC=com",//域的DC

Startup.cs中修改

Startup方法中:

LDAPUtil.Register(Configuration);

ConfigureServices 方法中:

services.AddAuthorization(options =>{});

Configure方法中:

app.UseCookieAuthentication(new CookieAuthenticationOptions()
     {
       AuthenticationScheme = Configuration.GetValue<string>("CookieName"),
       LoginPath = new PathString("/Account/Login/"),
       AccessDeniedPath = new PathString("/Account/Login/"),
       AutomaticAuthenticate = true,
       AutomaticChallenge = true
});

AccountController中新增登入和登出的Action

登入的頁面:

[AllowAnonymous]
public IActionResult Login()
{
    return View();
}

登入的Post頁面:

[HttpPost]
[AllowAnonymous]
public async Task<IActionResult> Login(string u, string p)
{
    if (LDAPUtil.Validate(u, p))
    {
        var identity = new ClaimsIdentity(new MyIdentity(u));//這個MyIdentity只是一個祼的IIdentity的實現的類
        var principal = new ClaimsPrincipal(identity);
        await HttpContext.Authentication.SignInAsync(LDAPUtil.CookieName, principal);
        return RedirectToAction("Index", "Home");
    }
    return View();
}

登出的頁面:

[Authorize]
public async Task<IActionResult> Logout()
{
   await HttpContext.Authentication.SignOutAsync(LDAPUtil.CookieName);
   return RedirectToAction("Index", "Home");
}

Demo

https://github.com/chsword/aspnet-core-ad-authentication

參照

https://github.com/dsbenghe/Novell.Directory.Ldap.NETStandard

https://www.nuget.org/packages/Microsoft.AspNetCore.Authentication.Cookies/

以上就是ASP.NET的Core AD域登入過程範例的詳細內容,更多關於ASP.NET Core AD域登入的資料請關注it145.com其它相關文章!


IT145.com E-mail:sddin#qq.com