-
-
Notifications
You must be signed in to change notification settings - Fork 569
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Security module for Azure AD #267
Comments
Is this enhancement for Azure AD + Piranha Identity? |
I haven't had the time to investigate it yet, but the idea is to.
This isn't really my area of expertise so I need to do some investigation on how it's done. Also the users from the AD needs to be connected with the claims they need for the Piranha Manager, not really sure if this kind of thing can be administered from the Azure AD or if you actually need a local Identity user handling these things and you only use the AD for login. Do you have any experience in integrating Azure AD with .NET Core? |
Yes, I've integrated Piranha with Azure AD as well. Since you have the manager set up with claims it's relatively straightforward if you augment the claims within startup code. Mapping custom claims in Azure AD is a pain so I would avoid it. Ideally those claims would be augmented by the roles assigned in the manager. I haven't gotten that far yet but would love to help. |
Well I haven't got that much experience with any of this :) How does it work, are you using the Identity module but with a custom Regards |
I followed these steps to setup WSFederation using Azure AD. https://docs.microsoft.com/en-us/aspnet/core/security/authentication/ws-federation?view=aspnetcore-2.1#use-ws-federation-without-aspnet-core-identity. So the basics it really had nothing to do with Piranha. I'll fork your examples repo and submit a PR for you to review as a basic example. |
Hi again @lestersconyers Do you have some code regarding this that you might be willing to share? Got a question regarding this from another user 🙂 |
Hey I’m evaluating using piranha CMS as our new code base for a public website, but it is kind of a requirement to use azure ad for the manager area, if you could share some example code I would pick it from there. |
I need support for IdentityServer. Both Azure AD and IdentityServer are OAuth2, so there shouldn't be much of a difference. I'll try it out in my fork and share if I get it up and running. (Also need multi-tenancy BTW, as mentioned in #1132 and related, so I'll see how far I get using Piranha.) |
@eloekset We really don’t have full multi tenancy planned as this is currently not in the roadmap. Best regards |
Yes, I saw that. I will have to live in a fork and keep it updated from your master branch. My first goal is OpenID/OAuth2 with IdSrv/Azure AD, and then it shouldn't be too hard to extend all storage with an AccountID or TenantID. |
I've finally had some time to work on the Azure AD module again, but I'm struggling with an issue that is difficult to figure out, so I created a discussion over in the aspnetcore repo and hope to get some help by someone: dotnet/aspnetcore#24690 |
i've also been trying to authenticate with azure ad b2c and i have this working. by working i mean
how i did it
a proposed first cut of a solution architecture that requires no code changes to piranha the full gist for the claims transformer is here https://gist.github.com/vigouredelaruse/f462a35c3ff5b8028868fd56ea5f9f3d
and you register it in startup.cs like this
as you can see my proof of concept has the claims mapping logic hardcoded to my specific situation but it's not quite generalized enough for me to deploy. the pieces in the architecture diagram aren't all there, and i'm not quite sure yet the diagram has all the required components. but it's a first cut additionally i currently have
and this bogus rewrite setup that's not actually doing anything useful yet
for additional service configuration we have
and swinging the hammer to kill the fly we have
you'll need sauce that smells similar to this bogus code
and your version of this
and the piece duh resistance
for me code complete would approach a solution that doesn't use identitywithseed, and has zero users in the database. for this proof of concept i only have that first admin user created during piranha install, but i won't go to market like that obviously for piranha with tens of thousands of downloads you might want to expand. the reach to https://auth0.com/ so hopefully you're able to duplicate and better my results for all to consume because the current issue with this setup is
|
@vigouredelaruse maybe #1623 can get you going more efficiently? |
Create security module for Azure AD so that the CMS can be easily integrated into an existing user base
The text was updated successfully, but these errors were encountered: