public async Task <IActionResult> Token(OpenIdConnectRequest request)
        {
            if (request.IsPasswordGrantType())
            {
                try
                {
                    var @for = request.GetParameter("for").GetValueOrDefault();

                    return(@for == "Business"
                        ? await PasswordBusiness(request.Username, request.Password)
                        : await Password(request.Username, request.Password));
                }
                catch
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "Invalid email or password"
                    }));
                }
            }
            else if (request.IsRefreshTokenGrantType())
            {
                // todo: test!
                // Retrieve the claims principal stored in the refresh token.
                var principal = (await HttpContext.AuthenticateAsync(OpenIddictValidationDefaults.AuthenticationScheme)).Principal;
                return(RefreshToken(principal));
            }
            return(BadRequest(new OpenIdConnectResponse
            {
                Error = OpenIdConnectConstants.Errors.InvalidClient,
                ErrorDescription = "The grant_type is not supported"
            }));
        }
Beispiel #2
0
        private IEnumerable <string> GetScopes(OpenIdConnectRequest request)
        {
            var scope = request.GetParameter("scopes");

            return(scope != null?
                   scope.Value.ToString().Split(' ') :
                       Enumerable.Empty <string>());
        }
Beispiel #3
0
        public void PropertySetter_AddsExpectedParameter(string property, string name, OpenIdConnectParameter value)
        {
            // Arrange
            var request = new OpenIdConnectRequest();

            // Act
            typeof(OpenIdConnectRequest).GetProperty(property).SetValue(request, value.Value);

            // Assert
            Assert.Equal(value, request.GetParameter(name));
        }
Beispiel #4
0
        public async Task <IActionResult> Exchange(OpenIdConnectRequest connectRequest)
        {
            if (connectRequest.IsPasswordGrantType())
            {
                ApplicationUser user = null;
                if (connectRequest.HasParameter("survey_user"))
                {
                    user = await this._accountManager.GetSurveyUserByShortcodeAsync(
                        int.Parse(connectRequest.GetParameter("survey_id")?.Value.ToString()),
                        connectRequest.GetParameter("shortcode")?.Value.ToString());
                }
                else
                {
                    user = await _userManager.FindByEmailAsync(connectRequest.Username) ?? await _userManager.FindByNameAsync(connectRequest.Username);
                }
                if (user == null)
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "Please check that your email and password is correct"
                    }));
                }

                // Ensure the user is enabled.
                if (!user.IsEnabled)
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "The specified user account is disabled"
                    }));
                }


                // Validate the username/password parameters and ensure the account is not locked out.
                var result = await _signInManager.CheckPasswordSignInAsync(user, connectRequest.Password, true);

                // Ensure the user is not already locked out.
                if (result.IsLockedOut)
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "The specified user account has been suspended"
                    }));
                }

                // Reject the token request if two-factor authentication has been enabled by the user.
                if (result.RequiresTwoFactor)
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "Invalid login procedure"
                    }));
                }

                // Ensure the user is allowed to sign in.
                if (result.IsNotAllowed)
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "The specified user is not allowed to sign in"
                    }));
                }

                if (!result.Succeeded)
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "Please check that your email and password is correct"
                    }));
                }



                // Create a new authentication ticket.
                var ticket = await this._authenticationService.CreateTicketAsync(connectRequest, user);

                return(SignIn(ticket.Principal, ticket.Properties, ticket.AuthenticationScheme));
            }
            else if (connectRequest.IsRefreshTokenGrantType())
            {
                // Retrieve the claims principal stored in the refresh token.
                var info = await HttpContext.AuthenticateAsync(OpenIdConnectServerDefaults.AuthenticationScheme);

                // Retrieve the user profile corresponding to the refresh token.
                // Note: if you want to automatically invalidate the refresh token
                // when the user password/roles change, use the following line instead:
                var user = await _signInManager.ValidateSecurityStampAsync(info.Principal);

                //var user = await _userManager.GetUserAsync(info.Principal);
                if (user == null)
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "The refresh token is no longer valid"
                    }));
                }

                // Ensure the user is still allowed to sign in.
                if (!await _signInManager.CanSignInAsync(user))
                {
                    return(BadRequest(new OpenIdConnectResponse
                    {
                        Error = OpenIdConnectConstants.Errors.InvalidGrant,
                        ErrorDescription = "The user is no longer allowed to sign in"
                    }));
                }

                // Create a new authentication ticket, but reuse the properties stored
                // in the refresh token, including the scopes originally granted.
                var ticket = await this._authenticationService.CreateTicketAsync(connectRequest, user);

                return(SignIn(ticket.Principal, ticket.Properties, ticket.AuthenticationScheme));
            }
            return(BadRequest(new OpenIdConnectResponse
            {
                Error = OpenIdConnectConstants.Errors.UnsupportedGrantType,
                ErrorDescription = "The specified grant type is not supported"
            }));
        }