so our organization is developing some new web apps using asp.net mvc and web api. we decided to not use active directory for authentication/authorization purposes so it looks like asp.net identity with entity framework might work.
looking at the database schema i don't see an applications table so we can have one central repository for user credentials and application access. is this where claims come in? how would that look; user -> app -> role -> permissions
also, one of our goals is to also provide users with single sign on. is this possible with the new bearer tokens?
thanks for any help you can provide
For the single sign on it's possible sharing cookies or using a different session state such as
<sessionState mode="SQLServer">
or<sessionState mode="StateServer">
https://msdn.microsoft.com/en-us/library/ms178586(v=vs.140).aspxTake a look at this tutorial. It shows how to implement ASP.NET Identity using Web API:
http://bitoftech.net/2015/01/21/asp-net-identity-2-with-asp-net-web-api-2-accounts-management/
As for dealing with multiple applications. Two approaches that come to mind are:
AppId
to all usernamesAppId
column toAspNetUsers
table, derive fromUserStore
and re-implement theFind
based methods so the queries take into account theAppId
For #1 when the application wants to create a new user it would send a request to the WebApi containing the new user information and an
AppId
. The WebApi would then concatenate theUserName
andAppId
to create the complete username that will be written to the database. So, if application1234
wants to create a user with the usernamemyuser
, then the WebApi will create a new user with the usernamemyuser_1234
. From that point on when querying the database you would first take theUserName
andAppId
from the request, concatenate them and then query the database.If another application
9900
wants to create amyuser
, then the final username written to the database would bemyuser_9900
.You may want to store the application details in the database and for every request validate the
AppId
to ensure that you recognise the application before processing its request.I've not thought much of step #2, so its just a suggestion.
If you wanted to share the user credentials across multiple applications, then you could probably ignore the above, go with standard functionality and just have all applications point to the same database therefore allowing all applications to access all users regardless of which application created which user.
UPDATE #1: In this instance bearer tokens could be used and I think (going from memory) the tutorial series mentioned above touches on this and how a single WebApi can provide tokens for multiple applications.
Your users and their credentials are stored in
AspNetUser
table and Roles are inASPNetRole
whileAspNetUserRole
serves as junction table between the two to map users and roles. You can implement SSO (Single Sign On) by sharing these tables in your applications. Like each application will need to read these tables and roles and login users. But a better approach would be to create a central WebApi to handle user authentication and authorization.Also if you Roles can be changed at run time then you have idea of Permissions, You can create a custom Table for storing permissions and then map Roles to Permissions. And when user logs-in just load all his permissions and store as claims. You can either serialize whole Role (with its permission list) and Store it as one claim. Or store each permission as individual claim whichever suits you best.