問題描述
我正在嘗試使用 ASP.NET Core 2.0 創建一個 Web API 服務器,該服務器使用 azure ad v2 端點令牌授權.我還有一個 Angular 2 應用程序,在其中進行 office365 登錄.我從那里得到一個令牌,然后向 Web API 服務器中的授權操作發送一個簡單的請求.但是我的令牌沒有通過授權檢查,我收到 401 Unauthorized 響應.提供的描述是:
I am trying to create a Web API server using ASP.NET Core 2.0 which uses azure ad v2 endpoint token authorization. I also have an Angular 2 app where the office365 login happens. I get a token from there and then send a simple request to an authorized action in the Web API server. However my token doesn't pass the authorization checks and I get a 401 Unauthorized response. The description provided is:
Bearer error="invalid_token", error_description="找不到簽名密鑰"
Bearer error="invalid_token", error_description="The signature key was not found"
我解碼了令牌,解碼器也拋出了無效簽名錯誤.以下是我用于配置和令牌授權的代碼的重要部分:
I decoded the token and the decoder throws an invalid signature error as well. Here are the important parts of my code I use for configuration and token authorization:
Web API 服務器:
appsettings.json
{
"AzureAd": {
"Instance": "https://login.microsoftonline.com/",
"ClientId": "my-registered-app-client-id",
},
"Logging": {
"IncludeScopes": false,
"Debug": {
"LogLevel": {
"Default": "Warning"
}
},
"Console": {
"LogLevel": {
"Default": "Warning"
}
}
}
}
AzureAdAuthenticationBuilderExtensions.cs
public static class AzureAdServiceCollectionExtensions
{
public static AuthenticationBuilder AddAzureAdBearer(this AuthenticationBuilder builder)
=> builder.AddAzureAdBearer(_ => { });
public static AuthenticationBuilder AddAzureAdBearer(this AuthenticationBuilder builder, Action<AzureAdOptions> configureOptions)
{
builder.Services.Configure(configureOptions);
builder.Services.AddSingleton<IConfigureOptions<JwtBearerOptions>, ConfigureAzureOptions>();
builder.AddJwtBearer();
return builder;
}
private class ConfigureAzureOptions: IConfigureNamedOptions<JwtBearerOptions>
{
private readonly AzureAdOptions _azureOptions;
public ConfigureAzureOptions(IOptions<AzureAdOptions> azureOptions)
{
_azureOptions = azureOptions.Value;
}
public void Configure(string name, JwtBearerOptions options)
{
options.Audience = _azureOptions.ClientId;
options.Authority = $"{_azureOptions.Instance}common/v2.0";
options.TokenValidationParameters = new TokenValidationParameters
{
ValidateIssuer = false,
};
}
public void Configure(JwtBearerOptions options)
{
Configure(Options.DefaultName, options);
}
}
}
Startup.cs
public class Startup
{
public Startup(IConfiguration configuration)
{
Configuration = configuration;
}
public IConfiguration Configuration { get; }
// This method gets called by the runtime. Use this method to add services to the container.
public void ConfigureServices(IServiceCollection services)
{
services.AddAuthentication(sharedOptions =>
{
sharedOptions.DefaultScheme = JwtBearerDefaults.AuthenticationScheme;
})
.AddAzureAdBearer(options => Configuration.Bind("AzureAd", options));
services.AddMvc();
services.AddCors(options =>
{
options.AddPolicy("AllowAllOrigins",
builder =>
{
builder.AllowAnyMethod().AllowAnyHeader().AllowAnyOrigin();
});
});
}
// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
public void Configure(IApplicationBuilder app, IHostingEnvironment env, ILoggerFactory loggerFactory)
{
loggerFactory.AddConsole(Configuration.GetSection("Logging"));
loggerFactory.AddDebug();
if (env.IsDevelopment())
{
app.UseDeveloperExceptionPage();
}
app.UseCors("AllowAllOrigins");
app.UseAuthentication();
app.UseMvc();
}
}
下面是我在 Angular2 應用中用來進行身份驗證的代碼:
import { Injectable } from '@angular/core';
import { Headers } from '@angular/http';
import * as hello from 'hellojs/dist/hello.all.js';
import * as MicrosoftGraph from "@microsoft/microsoft-graph-types";
import * as MicrosoftGraphClient from "@microsoft/microsoft-graph-client";
import { Configs } from "../../../shared/configs"
@Injectable()
export class HttpService {
url = `https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=${Configs.appId}&response_type=code&redirect_uri=http%3A%2F%2Flocalhost%2Fmyapp%2F&response_mode=query&scope=openid%20offline_access%20https%3A%2F%2Fgraph.microsoft.com%2Fmail.read&state=12345`;
getAccessToken() {
const msft = hello('msft').getAuthResponse();
const accessToken = msft.access_token;
return accessToken;
}
getClient(): MicrosoftGraphClient.Client
{
var client = MicrosoftGraphClient.Client.init({
authProvider: (done) => {
done(null, this.getAccessToken()); //first parameter takes an error if you can't get an access token
},
defaultVersion: 'v2.0'
});
return client;
}
}
當從端點返回令牌時,我會向我的 Web API 服務器上的有效端點發送請求.
When a token is returned from the endpoint I send a request to a valid endpoint on my Web API server.
重要提示:我在 Web API 和 Angular 應用程序中使用相同的 AppId,因為 AzureAd v2.0 端點需要它.
我的意思是,我認為我做的一切都是照本宣科,但顯然缺少一些東西.如果有人能告訴我我在配置中做錯了什么,我將不勝感激!
My point is that I think I'm doing everything by the book but there is obviously something missing. If anyone could tell me what I did wrong in my configuration, I'd be immeasurably grateful!
解碼令牌的aud屬性為:
aud property of decoded token is:
https://graph.microsoft.com
推薦答案
在評論中經過不那么簡短的討論后,問題得到了解決.
After a not-so-short discussion in the comments the issue was resolved.
討論的要點:
- 訪問令牌包含一個
aud
聲明,其值為https://graph.microsoft.com
,這意味著該令牌適用于 Microsoft Graph API,不是他們的 API - 需要在 https://apps.dev.microsoft.com/,之后應用需要使用類似于
api://25f66106-edd6-4724-ae6f-3a204cfd9f63/access_as_user
的scope
請求訪問令牌李>
- The access token contained an
aud
claim with the value ofhttps://graph.microsoft.com
, which means the token is meant for the Microsoft Graph API, not their API - A Web API needed to be registered at https://apps.dev.microsoft.com/, after which the app needed to ask for an access token using a
scope
similar to:api://25f66106-edd6-4724-ae6f-3a204cfd9f63/access_as_user
因此,請確保 aud
聲明包含 API 的客戶端 ID 或應用 ID URI.這意味著它適用于您的 API.
So make sure that the aud
claim contains the client ID or app ID URI for your API. That means it is meant for your API.
令牌還需要包含必要的范圍.
The token also needs to contain the necessary scopes.
從 AAD 請求訪問令牌時,請確保指定正確的范圍.
When asking for an access token from AAD, make sure you specify the correct scopes.
此外,如果您使用的是 v1 端點,請確保使用 ADAL,而不是 MSAL.在 v1 中,您還必須使用 resource
而不是范圍,它的值必須設置為 API 的客戶端 ID 或應用 ID URI.
Also, if you are using the v1 endpoints, make sure to use ADAL, not MSAL. In v1 also instead of scope, you have to use resource
, which must have a value set to either the client ID or app ID URI of the API.
這篇關于ASP.NET Core 2.0 Web API Azure Ad v2 令牌授權不起作用的文章就介紹到這了,希望我們推薦的答案對大家有所幫助,也希望大家多多支持html5模板網!