如何在MVC客户端应用程序中使用刷新令牌更新令牌?

时间:2019-03-01 05:16:14

标签: c# asp.net-mvc asp.net-web-api oauth

我的解决方案中有两种类型的应用程序 1)Web api应用程序 2)MMC c#应用程序

在这里,我创建了具有令牌身份验证功能的Web API应用程序。 在此应用程序中,从SQL Server数据库验证的用户名和密码。 即,如果任何用户请求Web api令牌,则该用户详细信息必须出现在数据库表中。(在用户表ID,用户名,密码列中包含数据)。 因此,我的Web API应用程序已连接到数据库服务器。

现在,我创建了使用Web API并访问数据的MVC c#应用程序。 我在这里所做的是,当用户将凭据放入mvc应用程序登录屏幕时,该凭据进入api并对其进行验证。 如果用户凭据正确,Api会给出数据响应。

在这里,我从Web api和“ access_token”,“ Expire_time”,“ refresh_token”等数据中获得了JSON响应 我将所有这些详细信息存储在Session对象中。

因此,每当我从mvc应用程序请求Getdata()时,我都会将“ access_token”传递给api并重新调整结果数据。

我将Web api令牌超时设置为2分钟。(令牌在2分钟后被删除)

问题出在这里,我该如何使用refresh_token在Web api中维护用户登录会话。我不想让用户再次获得登录屏幕并返回该屏幕。 因为每隔2分钟他就会得到登录屏幕,这不是正确的解决方案。

当api获取超时access_token时,我需要一些功能,并且mvc应用程序再次调用refresh_token并继续进行数据事务。

1 个答案:

答案 0 :(得分:0)

每当您的访问令牌过期时,您都可以传递刷新令牌,并可以像这样更新访问令牌。希望对您有帮助。

[AllowAnonymous]
        [HttpPost]
        public IHttpActionResult GetAccessToken(RefreshTokenModel getRefreshToken)
        {
            ApiResponse apiResponse = new ApiResponse();
            apiResponse.Message = "Your session has expired. Kindly login again.";
            try
            {
                var getHashToken = GenerateHash.GetHash(getRefreshToken.RefreshToken);
                var getRefreshTokenDetails = tokenDetailBl.GetRefreshTokenDetail(getHashToken);
                if (getRefreshTokenDetails != null && getRefreshTokenDetails.ExpiresUtc > DateTime.UtcNow && !string.IsNullOrEmpty(getRefreshTokenDetails.ProtectedTicket))
                {
                    if (getRefreshTokenDetails.DeviceType == getRefreshToken.DeviceType)
                    {
                        var currentTime = DateTime.UtcNow;
                        var refreshTokenLifeTime = Convert.ToDouble(ConfigurationManager.AppSettings["RefreshTokenExpireTime"]);
                        var tokenExpiration = Convert.ToDouble(ConfigurationManager.AppSettings["AccessTokenExpireTime"]);
                        ApiIdentityManager apiIdentityManager = new ApiIdentityManager();

                        var tokenData = JsonConvert.SerializeObject(new { Ticket = getRefreshTokenDetails.ProtectedTicket, DeviceId = getRefreshTokenDetails.DeviceId });
                        var getIdentityToken = apiIdentityManager.GetRefreshToken(tokenData);

                        // Delete Old Tokens
                        tokenDetailBl.DeleteAccessTokenByDevice(getRefreshTokenDetails.DeviceId);
                        var refreshToken = new RefreshToken()
                        {
                            RefreshTokenId = GenerateHash.GetHash(getIdentityToken.RefreshToken),
                            DeviceId = getRefreshTokenDetails.DeviceId,
                            DeviceType = getRefreshToken.DeviceType,
                            UserId = getRefreshTokenDetails.UserId,
                            IssuedUtc = currentTime,
                            ExpiresUtc = currentTime.AddMinutes(Convert.ToDouble(refreshTokenLifeTime)),
                            ProtectedTicket = getIdentityToken.Ticket
                        };

                        //Save new tokens
                        tokenDetailBl.SaveAccessToken(new TokenDetail
                        {
                            AccessToken = getIdentityToken.AccessToken,
                            CreatedOn = DateTime.UtcNow,
                            UserId = getRefreshTokenDetails.UserId,
                            DeviceId = getRefreshTokenDetails.DeviceId,
                            DeviceType = getRefreshToken.DeviceType
                        });
                        tokenDetailBl.SaveRefreshToken(refreshToken);

                        //Get token cache.
                        CachedData cachedData = new CachedData(tokenDetailBl);
                        var getAllToken = cachedData.GetAccessTokens();
                        cachedData.UpdateTokenCache(getIdentityToken.AccessToken, getRefreshTokenDetails.UserId + ":" + DateTime.UtcNow.AddMinutes(tokenExpiration).ToFormateDateTimeString());

                        var getUserDetails = userBl.GetUserDetails(getRefreshToken.UserId);
                        getUserDetails.DeviceId = getRefreshTokenDetails.DeviceId;
                        getUserDetails.DeviceType = getRefreshTokenDetails.DeviceType;
                        getUserDetails.AccessToken = getIdentityToken.AccessToken;
                        getUserDetails.TokenType = "bearer";
                        getUserDetails.ExpiresIn = getIdentityToken.ExpiresIn;
                        getUserDetails.Issued = getIdentityToken.Issued;
                        getUserDetails.Expires = DateTime.UtcNow.Add(TimeSpan.FromMinutes(tokenExpiration)).ToString("R");
                        getUserDetails.RefreshToken = getIdentityToken.RefreshToken;



                        //Dictionary<string, string> tokenResponse = new Dictionary<string, string>();
                        //tokenResponse.Add("access_token", getIdentityToken.AccessToken);
                        //tokenResponse.Add("token_type", "bearer");
                        //tokenResponse.Add("expires_in", getIdentityToken.ExpiresIn);
                        //tokenResponse.Add("issued", getIdentityToken.Issued);
                        //tokenResponse.Add("expires", DateTime.UtcNow.Add(TimeSpan.FromMinutes(tokenExpiration)).ToString("R"));
                        //tokenResponse.Add("refresh_token", getIdentityToken.RefreshToken);
                        return ResponseMessage(Request.CreateResponse(HttpStatusCode.OK, getUserDetails));
                    }
                    else
                    {
                        apiResponse.Message = "Your session has expired. Kindly login again.";
                    }
                }
            }
            catch (Exception ex)
            {
                Logger.Error(ex);
            }

            return ResponseMessage(Request.CreateResponse(HttpStatusCode.Gone, apiResponse));
        }

您可以使用MVC过滤器来检查您的访问令牌是否已过期。

[CacheAuthorize]
    [HttpPost]
    public IHttpActionResult GetUserList(SearchRequest searchRequest)

然后在该代码之后检查访问令牌的有效性

 public class CacheAuthorizeAttribute : AuthorizeAttribute
        {
            public CacheAuthorizeAttribute(params string[] roles)
                : base()
            {
                Roles = string.Join(",", roles);
            }

            public override void OnAuthorization(HttpActionContext actionContext)
            {

                Dictionary<HttpStatusCode, string> response;
                if (SkipAuthorization(actionContext))
                {
                    return;
                }

                var userSessionManager = new UserCacheManager();
                if (userSessionManager.ReValidateSession(out response))
                {
                    base.OnAuthorization(actionContext);
                }
                else
                {
                    ApiResponse apiResponse = new ApiResponse(response.Values.FirstOrDefault());
                    actionContext.Response = actionContext.ControllerContext.Request.CreateResponse(response.Keys.FirstOrDefault(), apiResponse);
                }


 }


/// <summary>
        /// Re-validates the user session. Usually called at each authorization request.
        /// If the session is not expired, extends it lifetime and returns true.
        /// If the session is expired or does not exist, return false.
        /// </summary>
        /// <returns>true if the session is valid</returns>
        public bool ReValidateSession(out Dictionary<HttpStatusCode, string> errorResponse)
        {

            errorResponse = new Dictionary<HttpStatusCode, string>();
            string authToken = this.GetCurrentBearerAuthrorizationToken();
             ITokenDetailRepository tokenDetailRepository = new TokenDetailRepository();
             ITokenDetailBL tokenDetailBl = new TokenDetailBL(tokenDetailRepository);
             CachedData cachedData = new CachedData(tokenDetailBl);
            if (!string.IsNullOrEmpty(authToken))
            {
                var currentUserId = this.GetCurrentUserId();
                var getUserTokens = cachedData.GetAccessTokens();
                if (!getUserTokens.ContainsKey(authToken))
                {
                    //Get Data from DB
                    cachedData.GetAccessToken(authToken);
                    getUserTokens = cachedData.GetAccessTokens();
                }
                return CheckAccessToken(getUserTokens, authToken, out errorResponse);
            }
            else
            {
                errorResponse.Add(HttpStatusCode.Gone, "Access token not found.");
            }
            return false;
        }

 private bool CheckAccessToken(Dictionary<string, string> accessTokenDictionary, string authToken, out Dictionary<HttpStatusCode, string> errorResponse)
        {
            errorResponse = new Dictionary<HttpStatusCode, string>();
            var hasToken = accessTokenDictionary.ContainsKey(authToken);

            if (hasToken)
            {
                var getTokenValue = accessTokenDictionary[authToken];
                var enCulture = new CultureInfo("en-US");
                DateTime tokenAddedDate;
                var isCorrectDate = DateTime.TryParseExact(getTokenValue.Split(new char[] { ':' }, 2)[1], "dd-MMM-yyyy,hh:mm tt", enCulture, DateTimeStyles.None, out tokenAddedDate);
                if (isCorrectDate)
                {
                    if (tokenAddedDate >= DateTime.UtcNow)
                    {
                        return true;
                    }
                    else
                    {
                        //Check Refresh token expired or not
                        errorResponse.Add(HttpStatusCode.Unauthorized, "Access token expired.");
                    }
                }
                else
                {
                    errorResponse.Add(HttpStatusCode.Gone, "Invalid access token.");
                }
            }
            else
            {
                errorResponse.Add(HttpStatusCode.Gone, "Invalid access token.");
            }
            return false;
        }