protected override Task ApplyResponseChallengeAsync() { if (Response.StatusCode != 401) { return(Task.FromResult <object>(null)); } AuthenticationResponseChallenge challenge = Helper.LookupChallenge(Options.AuthenticationType, Options.AuthenticationMode); if (challenge != null) { var beforeRedirectContext = new ZoomBeforeRedirectContext(Context, Options); Options.Provider.BeforeRedirect(beforeRedirectContext); string baseUri = Request.Scheme + Uri.SchemeDelimiter + Request.Host + Request.PathBase; string currentUri = baseUri + Request.Path + Request.QueryString; string redirectUri = baseUri + Options.CallbackPath; AuthenticationProperties properties = challenge.Properties; if (string.IsNullOrEmpty(properties.RedirectUri)) { properties.RedirectUri = currentUri; } // OAuth2 10.12 CSRF GenerateCorrelationId(properties); var queryStrings = new Dictionary <string, string>(StringComparer.OrdinalIgnoreCase); queryStrings.Add("response_type", "code"); queryStrings.Add("client_id", Options.ClientId); queryStrings.Add("redirect_uri", redirectUri); string scope = string.Join(" ", Options.Scope); if (string.IsNullOrEmpty(scope)) { // default scope if app hasn't requested one scope = "user:read"; } queryStrings.Add("scope", scope); string state = Options.StateDataFormat.Protect(properties); queryStrings.Add("state", state); string authorizationEndpoint = WebUtilities.AddQueryString(AuthorizeEndpoint, queryStrings); var redirectContext = new ZoomApplyRedirectContext(Context, Options, properties, authorizationEndpoint); Options.Provider.ApplyRedirect(redirectContext); } return(Task.FromResult <object>(null)); }
/// <summary> /// Called when a Challenge causes a redirect to authorize endpoint in the middleware, before the actual redirect. /// </summary> /// <param name="context">Contains redirect URI and <see cref="AuthenticationProperties"/> of the challenge </param> public virtual void BeforeRedirect(ZoomBeforeRedirectContext context) { OnBeforeRedirect(context); }