zoukankan      html  css  js  c++  java
  • JWT认证(System.IdentityModel.Tokens.Jwt)

    用到的命名空间

    using Microsoft.AspNetCore.Authentication.JwtBearer;

    using Microsoft.IdentityModel.Tokens;

    using System.IdentityModel.Tokens.Jwt;

    using System.Security.Claims;

    生成TOKEN方法

            [HttpGet("auth")]
            public IActionResult Get(Tmodel mod)
            {
                if (mod.user == "AngelaDaddy" && mod.pass == "123456")
                {
                    // push the user’s name into a claim, so we can identify the user later on.
                    var claims = new[]
                    {
                        new Claim(ClaimTypes.Name, mod.user),
                        new Claim(ClaimTypes.Role, "useradmin"),
                        new Claim(ClaimTypes.SerialNumber, "123123123"),
                        new Claim(ClaimTypes.Role, "useradmin1"),
                        new Claim(ClaimTypes.Role, "useradmin2"),
                        new Claim(ClaimTypes.Role, "useradmin3"),
                        new Claim(ClaimTypes.Name, mod.user + "1"),
                        new Claim(ClaimTypes.Name, mod.user + "2"),
                        new Claim(ClaimTypes.Name, mod.user + "3")
    
                   };
                    //sign the token using a secret key.This secret will be shared between your API and anything that needs to check that the token is legit.
                    var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_configuration["SecurityKey"]));
                    var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
                    //.NET Core’s JwtSecurityToken class takes on the heavy lifting and actually creates the token.
                    /**
                     * Claims (Payload)
                        Claims 部分包含了一些跟这个 token 有关的重要信息。 JWT 标准规定了一些字段,下面节选一些字段:
    
                        iss: The issuer of the token,token 是给谁的  发送者
                        audience: 接收的
                        sub: The subject of the token,token 主题
                        exp: Expiration Time。 token 过期时间,Unix 时间戳格式
                        iat: Issued At。 token 创建时间, Unix 时间戳格式
                        jti: JWT ID。针对当前 token 的唯一标识
                        除了规定的字段外,可以包含其他任何 JSON 兼容的字段。
                     * */
                    var token = new JwtSecurityToken(
                        issuer: "jwttest",
                        audience: "jwttest",
                        claims: claims,
                        notBefore: DateTime.UtcNow,
                        expires: DateTime.UtcNow.AddSeconds(10),
                        signingCredentials: creds);
    
                    return Ok(new
                    {
                        token = new JwtSecurityTokenHandler().WriteToken(token)
                    });
                }
    
                return BadRequest("用户名密码错误");
            }

    new Claim时,可以设置失效时间 JwtRegisteredClaimNames.Exp,值为Unix时间戳

    认证时需要添加生命周期校验

    LifetimeValidator = (DateTime? notBefore, DateTime? expires, SecurityToken securityToken, TokenValidationParameters validationParameters) => expires > DateTime.UtcNow

    var d = securityToken as JwtSecurityToken

    var res1 = d.Claims.Where(s => s.Type == ClaimTypes.Role && s.Value == "useradmin2").Count()

    生成Token时

    var token = new JwtSecurityToken(
    issuer: "jwttest",
    audience: "jwttest",
    claims: claims,
    notBefore: DateTime.Now,
    expires: DateTime.Now.AddSeconds(30),
    signingCredentials: creds);

    失效时间可以为本地时间或UTC时间

    //添加jwt验证:
    services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
    .AddJwtBearer(options =>
    {
    options.TokenValidationParameters = new TokenValidationParameters
    {
    ValidateIssuer = true,//是否验证Issuer
    ValidateAudience = true,//是否验证Audience
    ValidateLifetime = false,//是否验证失效时间
    ValidateIssuerSigningKey = true,//是否验证SecurityKey
    ValidAudience = "jwttest",//Audience
    ValidIssuer = "jwttest",//Issuer,这两项和前面签发jwt的设置一致
    IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(Configuration["SecurityKey"])),//拿到SecurityKey
    LifetimeValidator = (DateTime? notBefore, DateTime? expires, SecurityToken securityToken, TokenValidationParameters validationParameters) => expires > DateTime.UtcNow
    //LifetimeValidator = (DateTime? notBefore, DateTime? expires, SecurityToken securityToken, TokenValidationParameters validationParameters) =>
    //{
    // var d = securityToken as JwtSecurityToken;
    // var res1 = d.Claims.Where(s => s.Type == ClaimTypes.Role && s.Value == "useradmin2").Count();
    // var res2 = d.Claims.Where(s => s.Type == ClaimTypes.Role && s.Value == "useradmin3").Count();
    // var res3 = d.Claims.Where(s => s.Type == ClaimTypes.Name && s.Value == "useradmin2").Count();
    // var res4 = d.Claims.Where(s => s.Type == ClaimTypes.Role && s.Value == "useradmin8").Count();
    // return expires > DateTime.UtcNow;
    //}
    };
    });

    生成TOKEN

    using System;
    using System.Collections.Generic;
    using System.IdentityModel.Tokens.Jwt;
    using System.Security.Claims;
    using System.Text;
    using IdentityModel;
    using Microsoft.AspNetCore.Authorization;
    using Microsoft.AspNetCore.Mvc;
    using Microsoft.IdentityModel.Tokens;
    
    
    [HttpGet("token")]
            public ActionResult<string> Token(InputData inputData)
            {
                var tokenHandler = new JwtSecurityTokenHandler();
                var key = Encoding.UTF8.GetBytes("1111111111");
                var authTime = DateTime.UtcNow;
                var expiresAt = authTime.AddSeconds(3000);
                //// 第一种
                //var token = new JwtSecurityToken(
                //        issuer: "发送者(TokenCreate)",
                //        audience: "接收者(TokenServer)",
                //        claims: new Claim[]
                //        {
                //            new Claim("uname", inputData.Username)
                //        },
                //        notBefore: authTime,
                //        expires: expiresAt,
                //        signingCredentials: new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha512Signature)
                //    );
                // 第二种
                var tokenDescriptor = new SecurityTokenDescriptor
                {
                    Subject = new ClaimsIdentity(new Claim[]
                    {
                        new Claim(JwtClaimTypes.Audience,"Client2"),
                        //new Claim(JwtClaimTypes.Issuer,"发送者(TokenCreate)"),
                        //new Claim("uname", inputData.Username)
                    }),
                    Expires = expiresAt,
                    SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
                };
                var token = tokenHandler.CreateToken(tokenDescriptor);
                var tokenString = tokenHandler.WriteToken(token);
                return Ok(new
                {
                    access_token = tokenString,
                    token_type = "Bearer",
                    profile = new
                    {
                        uname = inputData.Username,
                        upass = inputData.Password,
                        auth_time = new DateTimeOffset(authTime).ToUnixTimeSeconds(),
                        expires_at = new DateTimeOffset(expiresAt).ToUnixTimeSeconds()
                    }
                });
            }
    生成TOKEN

    注册TOKEN

    using System;
    using System.Collections.Generic;
    using System.Linq;
    using System.Text;
    using System.Threading.Tasks;
    using IdentityModel;
    using Microsoft.AspNetCore.Authentication.JwtBearer;
    using Microsoft.AspNetCore.Builder;
    using Microsoft.AspNetCore.Hosting;
    using Microsoft.AspNetCore.HttpsPolicy;
    using Microsoft.AspNetCore.Mvc;
    using Microsoft.Extensions.Configuration;
    using Microsoft.Extensions.DependencyInjection;
    using Microsoft.Extensions.Hosting;
    using Microsoft.Extensions.Logging;
    using Microsoft.IdentityModel.Tokens;
    
    namespace WebApiJwtDemo
    {
        public class Startup
        {
            public Startup(IConfiguration configuration)
            {
                Configuration = configuration;
            }
    
            public IConfiguration Configuration { get; }
    
            // This method gets called by the runtime. Use this method to add services to the container.
            public void ConfigureServices(IServiceCollection services)
            {
                services.AddAuthentication(x =>
                {
                    x.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
                    x.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
                }).AddJwtBearer(o =>
                {
                    o.TokenValidationParameters = new TokenValidationParameters
                    {
                        //NameClaimType = JwtClaimTypes.Name,
                        //RoleClaimType = JwtClaimTypes.Role,
    
                        ValidIssuer = "发送者(TokenCreate)",
                        ValidAudience = "接收者(TokenServer)",
                        IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes("abc123!@#abc123!@#abc123!@#")),
    
                        RequireExpirationTime = true,
                        ClockSkew = TimeSpan.Zero,
                        ValidateLifetime = true
    
                        /***********************************TokenValidationParameters的参数默认值***********************************/
                        // RequireSignedTokens = true,
                        // SaveSigninToken = false,
                        // ValidateActor = false,
                        // 将下面两个参数设置为false,可以不验证Issuer和Audience,但是不建议这样做。
                        // ValidateAudience = true,
                        // ValidateIssuer = true, 
                        // ValidateIssuerSigningKey = false,
                        // 是否要求Token的Claims中必须包含Expires
                        // RequireExpirationTime = true,
                        // 允许的服务器时间偏移量
                        // ClockSkew = TimeSpan.FromSeconds(300),
                        // 是否验证Token有效期,使用当前时间与Token的Claims中的NotBefore和Expires对比
                        // ValidateLifetime = true
                    };
                });
                services.AddAuthorization(options =>
                {
                    options.AddPolicy("Author", policy =>
                    {
                        policy.RequireClaim("uname");
                    });
                });
                services.AddControllers();
            }
    
            // This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
            public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
            {
                if (env.IsDevelopment())
                {
                    app.UseDeveloperExceptionPage();
                }
                else
                {
                    // The default HSTS value is 30 days. You may want to change this for production scenarios, see https://aka.ms/aspnetcore-hsts.
                    app.UseHsts();
                }
    
                app.UseHttpsRedirection();
    
                app.UseRouting();
    
                app.UseAuthentication();
    
                app.UseAuthorization();
    
                app.UseEndpoints(endpoints =>
                {
                    endpoints.MapControllers();
                });
            }
        }
    }
    注册TOKEN
  • 相关阅读:
    求最低价格
    A*算法入门
    hdu 4715
    手动扩大栈内存,让AC无忧
    hdu 4710
    hdu 1698
    poj3468区间延迟更新模板题
    hdu 1059二进制优化背包问题
    2059龟兔赛跑
    水1276
  • 原文地址:https://www.cnblogs.com/lovewl2/p/10723425.html
Copyright © 2011-2022 走看看