Skip to content

Latest commit

 

History

History
154 lines (134 loc) · 6.5 KB

SAMPLE.md

File metadata and controls

154 lines (134 loc) · 6.5 KB

Sample WebApp

The AspNetCore MVC webapp contained in the samples/1_SimpleSPWebApp folder, is a sample implementation of a RelyingParty that uses the SDK.

If you have a look at the Startup.cs, you can find the statements to add the necessary middlewares and services, and a basic configuration of a RelyingParty that uses a self-signed X509 signing certificate in the appsettings.json file (if you need to change some of the settings, e.g. the OPs hostnames, the trustmarks, etc., this is the place).

Included in the WebApp is also a docker-compose.yml file, you can set up a complete Spid-Cie OIDC federation by cloning the Django repository and by adding the following section into the docker-compose.yml file contained in the Django repo's root folder.

  aspnetcore.relying-party.org:
    build:
      context: /<path_to_cloned_repo>/samples/1_SimpleSPWebApp
      dockerfile: Spid.Cie.OIDC.AspNetCore.WebApp/Dockerfile
    environment:
      - ASPNETCORE_ENVIRONMENT=Development
      - ASPNETCORE_URLS=http://+:5000
    ports:
      - "5000:5000"
    volumes:
      - ${APPDATA}/Microsoft/UserSecrets:/root/.microsoft/usersecrets:ro
      - ${APPDATA}/ASP.NET/Https:/root/.aspnet/https:ro
    networks:
      - oidcfed

Add the following mappings into your hosts file:

127.0.0.1 trust-anchor.org
127.0.0.1 cie-provider.org
127.0.0.1 relying-party.org
127.0.0.1 aspnetcore.relying-party.org

Now you should be able to run the entire federation by just opening a Terminal session into the Django repo's root folder and running docker-compose up

Now your relying party should respond to http://aspnetcore.relying-party.org:5000/ and the Trust Anchor should respond to http://trust-anchor.org:8000/

Now navigate to the endpoint that shows the openid federation configuration of the RP as a decoded json (http://aspnetcore.relying-party.org:5000/.well-known/openid-federation/json), you will receive something like the following output.

{
  "metadata": {
    "openid_relying_party": {
      "client_registration_types": [
        "automatic"
      ],
      "application_type": "web",
      "client_name": "RP Test",
      "contacts": [
        "[email protected]"
      ],
      "grant_types": [
        "authorization_code",
        "refresh_token"
      ],
      "jwks": {
        "keys": [
          {
            "kty": "RSA",
            "use": "sig",
            "kid": "B5D9B00247B14DF93690A2E4F763C12357EF69F8",
            "x5t": "tdmwAkexTfk2kKLk92PBI1fvafg",
            "e": "AQAB",
            "n": "mGLk2E8AziGBAmj8XuU-....",
            "x5c": [
              "MIIGIjCCBAqgAwIBAg...."
            ],
            "alg": "RS256"
          }
        ]
      },
      "redirect_uris": [
        "http://aspnetcore.relying-party.org:5000/signin-spidcie"
      ],
      "response_types": [
        "code"
      ],
      "subject_type": "pairwise"
    }
  },
  "authority_hints": [
    "http://trust-anchor.org:8000/"
  ],
  "iss": "http://aspnetcore.relying-party.org:5000/",
  "sub": "http://aspnetcore.relying-party.org:5000/",
  "iat": 1648737995,
  "exp": 1648910795,
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "B5D9B00247B14DF93690A2E4F763C12357EF69F8",
        "x5t": "tdmwAkexTfk2kKLk92PBI1fvafg",
        "e": "AQAB",
        "n": "mGLk2E8AziGBAmj8XuU-....",
        "x5c": [
          "MIIGIjCCBAqgAwIBAg...."
        ],
        "alg": "RS256"
      }
    ]
  }
}

Please, take note of the keys field value in the json, you will need it later in the onboarding phase.

Now you should be able to navigate the TA admin panel at the following url: http://trust-anchor.org:8000/admin Please enter the admin credentials, and you will be presented with the TA admin panel main page.

The onboarding process can be summarized as follows:

  • Click on the "Onboarding registrations" link on the left to start the RP onboarding phase, the Onboarding page will show.
  • Click on the "Add onboarding registration" button on the top-right corner, and a form will show.
  • Fill the form with the requested data (now you can paste the keys value in the Public Jwks field) and click Save. The newly added RP should appear in the onboarded entities list.
  • Now click on the "Federation entity descendants" button, in order to add the onboarded RelyingParty as a direct descendand of the TrustAnchor.
  • Click on the "Add federation entity descendand" button on the top-right corner, and a form will show.
  • Fill the form with the requested data (you should paste the same keys value in the Public Jwks field) and click Save. The newly added descendand should appear in the descendants list.
  • Now click on the "Federation entity descendants assigned profiles" button, in order to assign a profile to the newly created descendant and have the trust mark generated for it.
  • Click on the "Add federation entity descendand assigned profile" button on the top-right corner, and a form will show.
  • Select the RP as the descendant, a profile (e.g. the Public one) and the Issuer (the Trust Anchor at http://trust-anchor.org:8000/) and click Save
  • The RP descendant should now appear in the associated policies.
  • If you click again on the RP in the "Federation entity descendants assigned profiles" page, now you should see the generated Trust Mark

SpidCieOIDCOnboarding

Copy the newly generated Trust Mark in the proper configuration section for the RP.

  "SpidCie": {
    // ...
    "RelyingParties": [
      {
        // ....
        "TrustMarks": [
          {
            "Id": "https://www.spid.gov.it/openid-federation/agreement/sp-public/",
            "Issuer": "http://trust-anchor.org:8000/",
            "TrustMark": "eyJhbGciOiJSUzI1NiIsImtpZCI6ImRCNjdnTDdjazNURmlJQWY3TjZfN1NIdnFrME1EWU....."
          }
        ],
        // ...

Now you should stop and restart the federation in order to have the RP to reload the configuration. You can stop the federation by a Ctrl+C in the terminal window where the compose is running, and restart it by running the following command:

docker-compose build aspnetcore.relying-party.org && docker-compose up

Now you can perform a sample login/logout flow, since the OP will successfully resolve the RP's trust chain, by navigating the RP's home page (http://aspnetcore.relying-party.org:5000/)

SpidCieOIDCLoginLogout