public UserManager(IUserStore <IdentityUser, string> store) : base(store) { UserValidator = new UserValidator <IdentityUser, string>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; PasswordValidator = new PasswordValidator { RequireUppercase = true, RequireLowercase = true, RequiredLength = 6 }; ClaimsIdentityFactory = new AppClaimsIdentityFactory(); OoredooMessageService = new OoredooSmsService(); CustomEmailService = new CustomEmailService(); var dataProtectionProvider = Startup.DataProtectionProvider; if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <IdentityUser>(dataProtectionProvider.Create("ASP.Net Identity")); } }
public ApplicationUserManager(IUserStore <ApplicationUser> store) : base(store) { PasswordValidator = new PasswordValidator { RequireDigit = true, RequiredLength = 6, RequireLowercase = true, RequireNonLetterOrDigit = false, RequireUppercase = false }; UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = true, RequireUniqueEmail = true }; EmailService = new EmailService(); DpapiDataProtectionProvider provider = new DpapiDataProtectionProvider("ASP.NET IDENTITY"); UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>( provider.Create("EmailConfirmation")) { TokenLifespan = TimeSpan.FromHours(1) }; }
public ApplicationUserManager(IUserStore <User, int> store, IIdentityMessageService messageService) : base(store) { // Configure validation logic for usernames UserValidator = new UserValidator <User, int>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false, }; // Configure user lockout defaults UserLockoutEnabledByDefault = false; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; EmailService = messageService; UserTokenProvider = new DataProtectorTokenProvider <User, int>( Startup.DataProtectionProvider.Create("ASP.NET Identity")); }
private void Configure(IDataProtectionProvider dataProtectionProvider) { // Configure validation logic for usernames UserValidator = new UserValidator <ApplicationUser, int>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 1, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false, }; // Register two factor authentication providers. This application uses Phone and Emails as a step of receiving a code for verifying the user // You can write your own provider and plug in here. RegisterTwoFactorProvider("PhoneCode", new PhoneNumberTokenProvider <ApplicationUser, int> { MessageFormat = "Your security code is: {0}" }); RegisterTwoFactorProvider("EmailCode", new EmailTokenProvider <ApplicationUser, int> { Subject = "Security Code", BodyFormat = "Your security code is: {0}" }); if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser, int>(dataProtectionProvider.Create("ASP.NET Identity")); } }
public UserManager(IdentityFactoryOptions <UserManager> options, IUserStore <User, Guid> store) : base(store) { UserValidator = new UserValidator <User, Guid>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; PasswordValidator = new PasswordValidator { RequiredLength = 5, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false }; var dataProtectionProvider = options.DataProtectionProvider; if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <User, Guid>(dataProtectionProvider.Create("ASP.NET Identity")); } }
public ApplicationUserManager( IUserStore <IUser> store, IdentityFactoryOptions <ApplicationUserManager> options) : base(store) { UserValidator = new UserValidator <IUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = false }; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 5, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false, }; var dataProtectionProvider = options.DataProtectionProvider; if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <IUser>( dataProtectionProvider.Create("ASP.NET Identity")); } }
public ApplicationUserManager(IUserStore <ApplicationUser> store) : base(store) { // Configure validation logic for usernames UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = true, RequireDigit = true, RequireLowercase = true, RequireUppercase = true, }; // Configure user lockout defaults UserLockoutEnabledByDefault = true; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; // Creat a token provider to generate the magic links var tokenProvider = new DpapiDataProtectionProvider("Piccolo"); // Set our new token provider as the default to be used // Declare what purposes we'll be using the token for UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(tokenProvider.Create("EmailConfirmation", "PasswordReset")); }
public IndexModel(CustomEmailConfirmationTokenProvider <IdentityUser> customEmailConfirmationTokenProvider, DataProtectorTokenProvider <IdentityUser> dataProtectorTokenProvider, UserManager <IdentityUser> userManager) { _customEmailConfirmationTokenProvider = customEmailConfirmationTokenProvider; _dataProtectorTokenProvider = dataProtectorTokenProvider; _userManager = userManager; }
public ApplicationUserManager(IUserStore <User> store) : base(store) { // Configure validation logic for usernames. UserValidator = new UserValidator <User>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords. PasswordValidator = new PasswordValidator { RequiredLength = 8, RequireLowercase = true, RequireUppercase = true, RequireDigit = true }; // Configure user lockout defaults UserLockoutEnabledByDefault = false; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; var dataProtectionProvider = new AesDataProtectorProvider(new Sha512CspFactory(), new Sha256CspFactory(), new AesCspFactory()); UserTokenProvider = new DataProtectorTokenProvider <User>(dataProtectionProvider.Create("ASP.NET Identity")); }
public ApplicationUserManager(IDbSession dbSession) : base(new ApplicationUserStore(dbSession.Current as DatabaseContext)) { // Configure validation logic for usernames UserValidator = new UserValidator <User, Guid>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 8, RequireNonLetterOrDigit = true, RequireDigit = false, RequireLowercase = true, RequireUppercase = true, }; // Configure user lockout defaults UserLockoutEnabledByDefault = true; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; EmailService = new EmailService(); SmsService = new SmsService(); var dataProtectionProvider = Startup.DataProtectionProvider; if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <User, Guid>(dataProtectionProvider.Create("ASP.NET Identity")); } }
/// <summary> /// Constructor method. /// </summary> public DotUserManager(DotUserStore userStore, IEmailService emailService, IDataProtectionProvider dataProtectionProvider) : base(userStore) { // Username UserValidator = new UserValidator <DotUser, int>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = false }; // Passwords PasswordValidator = new PasswordValidator { RequiredLength = User.PasswordMinLength, RequireDigit = false, RequireLowercase = false, RequireUppercase = false, RequireNonLetterOrDigit = false }; EmailService = new IdentityEmailService(emailService); if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <DotUser, int>(dataProtectionProvider.Create(".Net Admin Identity")); } }
public ApplicationUserManager(IUserStore <ApplicationUser> store, IDataProtectionProvider dataProtectionProvider, IClaimsRepository claimsRepository, ConfigurationService configurationService) : base(store) { this.claimsRepository = claimsRepository; this.configurationService = configurationService; UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords PasswordValidator = new PasswordPolicy(); // Configure user lockout defaults UserLockoutEnabledByDefault = true; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(dataProtectionProvider.Create("ASP.NET Identity")); }
public ApplicationUserManager(IUserStore <ApplicationUser> store, IIdentityMessageService emailService, IdentityFactoryOptions <ApplicationUserManager> options) : base(store) { EmailService = emailService; UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = true, RequireDigit = true, RequireLowercase = true, RequireUppercase = true }; var dataProtectionProvider = options.DataProtectionProvider; if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(dataProtectionProvider.Create("ASP.NET Identity")) { TokenLifespan = TimeSpan.FromHours(24) } } ; } }
public ApplicationUserManager(IUserStore <User> store) : base(store) { ConfigureUserValidator(); ConfigurePasswordValidator(); UserTokenProvider = new DataProtectorTokenProvider <User>(new DpapiDataProtectionProvider().Create("ASP.NET Identity")); }
public UserManager() : base(new UserStore <ApplicationUser>(new ApplicationDbContext())) { var dataProtectionProvider = Startup.DataProtectionProvider; UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(dataProtectionProvider.Create("ZATApp")); }
public AppUserManager(IAppUserStore store) : base(store) { //No es posible asignar esto en el constructor, se evita la logica. //// Configure validation logic for usernames //manager.UserValidator = new UserValidator<ApplicationUser>(manager) //{ // AllowOnlyAlphanumericUserNames = false, // RequireUniqueEmail = true //}; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false, }; // Configure user lockout defaults UserLockoutEnabledByDefault = true; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; var provider = new Microsoft.Owin.Security.DataProtection.DpapiDataProtectionProvider("MDD"); UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser, Guid>(provider.Create("ASP.NET Identity")) { TokenLifespan = TimeSpan.FromHours(3) }; }
public UserManager(IUserStore <User, int> store, IDataProtectionProvider provider) : base(store) { UserValidator = new UserValidator <User, int>(this) { AllowOnlyAlphanumericUserNames = true, RequireUniqueEmail = true, }; PasswordValidator = new PasswordValidator() { RequireDigit = false, RequiredLength = 5, RequireLowercase = false, RequireUppercase = false, RequireNonLetterOrDigit = false }; EmailService = new MailService(); if (provider != null) { UserTokenProvider = new DataProtectorTokenProvider <User, int>(provider.Create("ASP.NET Identity")) { TokenLifespan = TimeSpan.FromHours(6) }; } }
public ApplicationUserManager(IUserStore <ApplicationUser> store) : base(store) { UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; PasswordValidator = new PasswordValidator { RequiredLength = IdentityHelper.MinimumPasswordLength, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false, }; UserLockoutEnabledByDefault = false; EmailService = new EmailService(); var provider = new DpapiDataProtectionProvider("Ingresso"); var dataProtector = provider.Create("ASP.NET Identity"); UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(dataProtector); }
private void ConfigureIdentityServices(ContainerBuilder builder) { // Register the owin context - this allows non-web api services // access to the hosting builder.Register(c => c.Resolve <HttpRequestMessage>().GetOwinContext()) .As <IOwinContext>() .InstancePerRequest(); builder.RegisterType <IdentityProvider>() .AsImplementedInterfaces() .InstancePerRequest(); // Options builder.Register(c => new IdentityFactoryOptions <ApplicationUserManager> { DataProtectionProvider = new Microsoft.Owin.Security.DataProtection.DpapiDataProtectionProvider(Constants.ApplicationName) }); builder.Register(c => { IUserTokenProvider <ApplicationUser, string> tokenProvider = null; var options = c.Resolve <IdentityFactoryOptions <ApplicationUserManager> >(); var dataProtectionProvider = options.DataProtectionProvider; if (options.DataProtectionProvider != null) { tokenProvider = new DataProtectorTokenProvider <ApplicationUser>(dataProtectionProvider.Create(Constants.ApplicationName)); } return(tokenProvider); }); builder.Register(c => HttpContext.Current.GetOwinContext().Authentication).As <IAuthenticationManager>(); }
//private static readonly byte[] KEY_64 = { 12, 16, 93, 156, 90, 4, 218, 32 }; //private static readonly byte[] IV_64 = {2, 5, 246, 79, 36, 32, 167, 3}; public ApplicationUserManager(IUserStore <ApplicationUser> store, IEmailHandler emailHandler) : base(store) { var provider = DataProtectionProvider; //new DpapiDataProtectionProvider("FileManager"); //var dataProtectionProvider = DataProtectionProvider; UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>( provider.Create("EmailConfirmation")); UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = true, RequireDigit = true, RequireLowercase = true, RequireUppercase = true, }; // Configure user lockout defaults UserLockoutEnabledByDefault = false; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; EmailService = new EmailService(emailHandler); }
public ApplicationUserManager(IUserStore <ApplicationUser> store, IDataProtectionProvider dataProtectionProvider) : base(store) { UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; PasswordValidator = new PasswordValidator { RequiredLength = 1, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false, }; UserLockoutEnabledByDefault = false; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; ClaimsIdentityFactory = new ApplicationUserClaimsIdentityFactory(); UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(dataProtectionProvider.Create("ASP.NET Identity")); }
public AecUserManager(IUserStore <User, long> store) : base(store) { UserValidator = new UserValidator <User, long>(this) { AllowOnlyAlphanumericUserNames = false //, RequireUniqueEmail = true }; PasswordHasher = new AecPasswordHasher(); // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = Utility.MinimumLength, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false, }; // Configure user lockout defaults UserLockoutEnabledByDefault = true; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; var dataProtectionProvider = Startup.DataProtectionProvider; if (dataProtectionProvider != null) { IDataProtector dataProtector = dataProtectionProvider.Create("ASP.NET Identity"); UserTokenProvider = new DataProtectorTokenProvider <User, long>(dataProtector); } }
private void CreateApplicationUserManager() { ClaimsIdentityFactory = new CustomClaimsIdentityFactory(); UserValidator = new CustomUserValidator <User, long>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; PasswordValidator = new CustomPasswordValidator { RequiredLength = 5, RequireNonLetterOrDigit = false, RequireDigit = false, RequireLowercase = false, RequireUppercase = false }; UserLockoutEnabledByDefault = true; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; if (_dataProtectionProvider == null) { return; } var dataProtector = _dataProtectionProvider.Create("Asp.net Identity"); UserTokenProvider = new DataProtectorTokenProvider <User, long>(dataProtector); }
/// <summary> /// Constructor method. /// </summary> /// <param name="identityRepository">The identity specialized repository.</param> /// <param name="dataProtectionProvider">The current data protection provider.</param> /// <param name="userStore">The current user store.</param> public AdminUserManager(IIdentityRepository identityRepository, IDataProtectionProvider dataProtectionProvider, AdminStore userStore) : base(userStore) { _identityRepository = identityRepository; UserLockoutEnabledByDefault = _Constants.UsersLockoutEnabledByDefault; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(_Constants.UsersLocloutIntervalInMinutes); MaxFailedAccessAttemptsBeforeLockout = _Constants.UsersLockoutMaxFailedAccessAttempts; UserValidator = new UserValidator <AdminUserEntity, int>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; PasswordValidator = new PasswordValidator { RequiredLength = _Constants.UsersPasswordMinLength, RequireDigit = _Constants.UsersPasswordRequiresDigit, RequireLowercase = _Constants.UsersPasswordRequiresLowercase, RequireUppercase = _Constants.UsersPasswordRequiresUppercase, RequireNonLetterOrDigit = _Constants.UsersPasswordRequiresNonLetterOrDigit }; if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <AdminUserEntity, int>(dataProtectionProvider.Create("Skeleton [Admin Identity]")); } }
public ApplicationUserManager(IUserStore <ApplicationUser> store, IdentityFactoryOptions <ApplicationUserManager> options) : base(store) { UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; // Configure validation logic for passwords PasswordValidator = new PasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = true, RequireDigit = true, RequireLowercase = true, RequireUppercase = true }; // Configure user lockout defaults UserLockoutEnabledByDefault = true; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; IDataProtectionProvider dataProtectionProvider = options.DataProtectionProvider; if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(dataProtectionProvider.Create("ASP.NET Identity")); } }
public ShroomsUserManager(IUserStore <ApplicationUser> store, IDataProtectionProvider dataProtectionProvider, IIdentityMessageService emailService, ShroomsClaimsIdentityFactory claimsIdentityFactory, ICustomCache <string, IEnumerable <string> > permissionsCache) : base(store) { _permissionsCache = permissionsCache; UserValidator = new ShroomsUserValidator(this); ClaimsIdentityFactory = claimsIdentityFactory; EmailService = emailService; UserValidator = new ShroomsUserValidator(this) { RequireUniqueEmail = true, AllowOnlyAlphanumericUserNames = false }; PasswordValidator = new ShroomsPasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = false, RequireDigit = true, RequireLowercase = true, RequireUppercase = true }; UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(dataProtectionProvider.Create("ASP.NET Identity")); }
public UserManager(UserStore userStore) : base(userStore) { UserValidator = new MyUserValidator(this) { AllowOnlyAlphanumericUserNames = true, RequireUniqueEmail = true }; PasswordValidator = new MyPasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = false, RequireDigit = true, RequireLowercase = false, RequireUppercase = false }; EmailService = new EmailService(); var dataProtectionProvider = Startup.DataProtectionProvider; if (dataProtectionProvider != null) { UserTokenProvider = new DataProtectorTokenProvider <User>(dataProtectionProvider.Create("ASP.NET Identity")) { TokenLifespan = TimeSpan.FromDays(1) }; } }
public AppUserManager(AppUserStore store) : base(store) { var provider = new DpapiDataProtectionProvider("SweetHome"); UserTokenProvider = new DataProtectorTokenProvider <AppUser, long>(provider.Create("EmailConfirmation")); }
public ApplicationUserManager(IUserStore <ApplicationUser, int> store) : base(store) { UserValidator = new UserValidator <ApplicationUser, int>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; PasswordValidator = new PasswordValidator() { RequiredLength = 6, RequireDigit = true, RequireLowercase = true, RequireNonLetterOrDigit = true, RequireUppercase = true }; UserLockoutEnabledByDefault = true; DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5); MaxFailedAccessAttemptsBeforeLockout = 5; RegisterTwoFactorProvider("Email Code", new EmailTokenProvider <ApplicationUser, int> { Subject = "Security Code", BodyFormat = "Your security code is {0}" }); UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser, int>(new DpapiDataProtectionProvider("VacaaYAY").Create("ASP.NET Identity")); EmailService = new EmailService(); }
public ApplicationUserManager(IUserStore <ApplicationUser> store, IdentityFactoryOptions <ApplicationUserManager> options) : base(store) { UserValidator = new UserValidator <ApplicationUser>(this) { AllowOnlyAlphanumericUserNames = false, RequireUniqueEmail = true }; PasswordValidator = new PasswordValidator { RequiredLength = 6, RequireNonLetterOrDigit = true, RequireDigit = true, RequireLowercase = true, RequireUppercase = true, }; var provider = options.DataProtectionProvider; if (provider != null) { UserTokenProvider = new DataProtectorTokenProvider <ApplicationUser>(provider.Create("ASP.NET Identity")) { TokenLifespan = TimeSpan.FromHours(6) }; } }