signin-oidc not handled?
See original GitHub issueFor some reason the redirect to “/sigin-oidc” gets handled by the Angular SPA fallback (app.UseSPA(...)
)
(Of course Angular reports that the given route does not exist)
I’m trying to add signin with implicit flow but because of this issue I can’t get it to work.
I am using the AspNetCoreSpa template with minor modifications.
Edit:
var descriptor = new OpenIddictApplicationDescriptor
{
ClientId = "xxxx",
DisplayName = "xxxx",
PostLogoutRedirectUris = { new Uri($"{host}signout-oidc") },
RedirectUris = { new Uri($"{host}signin-oidc") },
Permissions =
{
OpenIddictConstants.Permissions.Endpoints.Authorization,
OpenIddictConstants.Permissions.Endpoints.Token,
OpenIddictConstants.Permissions.GrantTypes.Implicit,
OpenIddictConstants.Permissions.GrantTypes.Password,
OpenIddictConstants.Permissions.GrantTypes.RefreshToken
}
};
I don’t know much about OpenID Connect or oAuth, but doesn’t openiddict handle /signin-oidc?
Issue Analytics
- State:
- Created 6 years ago
- Comments:11 (5 by maintainers)
Top Results From Across the Web
OpenIdConnect signin-oidc route not handled by ASP.NET ...
I am using an external OIDC identity provider to log my users into my webshop. The webshop is being built on ASP.NET MVC...
Read more >Enable your ASP.NET Core web app to sign in users and ...
This sample demonstrates a ASP.NET Core Web App calling the Microsoft Graph.
Read more >OpenID Connect (OIDC) on the Microsoft identity platform
Sign in Azure AD users by using the Microsoft identity platform's implementation of the OpenID Connect extension to OAuth 2.0.
Read more >Override or hook into /signin-oidc endpoint : r/Blazor
I have a Blazor server app with Azure AD B2C authentication and I would like to do something when the user logs in...
Read more >OpenID Connect documentation is wrong for Azure AD
The documentation regarding OpenID Connect using Azure AD as an authentication source is incorrect. I advise that no one attempt to try it ......
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Finally I was able to figure out why it does not work.
I was using a
HttpInterceptor
from angular to setAuthentication
header (as you can see above on the image). But since I was using the older and outdatedHttp
class for API requests, the HttpInterceptor didn’t work, so the authentication header didn’t get set. Migrating to the newerHttpClient
(which supports the interceptor) fixed the issue (well some requests were already using the HttpClient and that confused me a lot on debugging)Thank you for your time! And thanks for providing this great library!
Are you 100% sure the access token is not stripped?
When validating the token, you should have a trace similar to this one indicating that ASP.NET Core Data Protection tried to decrypt it:
The fact you don’t have this message makes me think the token is malformed and can’t be base64url-decoded by ASP.NET Core.