我试图在JWT
项目中使用ASP.NET Core Web API
进行身份验证机制。假设此项目没有MVC
部分,并且不使用cookie身份验证。我已根据this guide创建了我的代码。
登录效果很好,[Authorize]
属性保护功能正常但User.Identity.Name
为null
。我该如何解决这个问题?
我的代码:
public void Configure(IApplicationBuilder app, IHostingEnvironment env, ILoggerFactory loggerFactory)
{
var jwtAppSettingOptions = Configuration.GetSection(nameof(JwtIssuerOptions));
var tokenValidationParameters = new TokenValidationParameters
{
ValidateIssuer = true,
ValidIssuer = jwtAppSettingOptions[nameof(JwtIssuerOptions.Issuer)],
ValidateAudience = true,
ValidAudience = jwtAppSettingOptions[nameof(JwtIssuerOptions.Audience)],
ValidateIssuerSigningKey = true,
IssuerSigningKey = _signingKey,
RequireExpirationTime = true,
ValidateLifetime = true,
ClockSkew = TimeSpan.Zero
};
app.UseJwtBearerAuthentication(new JwtBearerOptions
{
AutomaticAuthenticate = true,
AutomaticChallenge = true,
TokenValidationParameters = tokenValidationParameters,
AuthenticationScheme = JwtBearerDefaults.AuthenticationScheme
});
app.UseMvc(routes =>
{
routes.MapRoute(
name: "default",
template: "{controller=Home}/{action=Index}/{id?}");
});
}
[HttpPost]
[AllowAnonymous]
[Route("Login")]
public async Task<IActionResult> Login([FromForm] ApplicationUser applicationUser)
{
//assume user/pass are checked and are ok
_logger.LogInformation(1, "API User logged in.");
var user = await _userManager.FindByNameAsync(applicationUser.UserName);
var roles = await _userManager.GetRolesAsync(user);
var claims = new List<Claim>
{
new Claim(JwtRegisteredClaimNames.Sub, applicationUser.UserName),
new Claim(ClaimTypes.NameIdentifier, applicationUser.UserName),
new Claim(JwtRegisteredClaimNames.Jti, await _jwtOptions.JtiGenerator()),
new Claim(JwtRegisteredClaimNames.Iat,
ToUnixEpochDate(_jwtOptions.IssuedAt).ToString(),
ClaimValueTypes.Integer64),
new Claim("Claim", "Value")
};
if (roles != null)
foreach (var role in roles)
claims.Add(new Claim("role", role));
// Create the JWT security token and encode it.
var jwt = new JwtSecurityToken(
issuer: _jwtOptions.Issuer,
audience: _jwtOptions.Audience,
claims: claims,
notBefore: _jwtOptions.NotBefore,
expires: _jwtOptions.Expiration,
signingCredentials: _jwtOptions.SigningCredentials);
var encodedJwt = new JwtSecurityTokenHandler().WriteToken(jwt);
// Serialize and return the response
var response = new
{
access_token = encodedJwt,
expires_in = (int)_jwtOptions.ValidFor.TotalSeconds
};
var json = JsonConvert.SerializeObject(response, _serializerSettings);
return new OkObjectResult(json);
}
答案 0 :(得分:18)
在您的声明中(第二个代码段)我只能看到这个:
new Claim(ClaimTypes.NameIdentifier, applicationUser.UserName),
但你需要添加:
new Claim(ClaimTypes.Name, applicationUser.UserName),
然后User.Identity.Name应包含用户名。
答案 1 :(得分:6)
另一种选择是在JwtRegisteredClaimNames.Sub
中设置tokenValidationParameters
的命名空间。这将让您继续使用标准:
var tokenValidationParameters = new TokenValidationParameters
{
// Ensure that User.Identity.Name is set correctly after login
NameClaimType = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
... existing code ...
}
更新:Diogo Barros在我的博客上留下了关于此主题的评论:
&#34;你好,
感谢您的帮助。这对我有用。 为了更加一致和安全,您可以使用ClaimTypes.NameIdentifier(在System.Security.Claims命名空间中),而不是硬编码字符串。&#34;
我已经将代码更改为使用内置的ClaimTypes枚举,因为它比使用命名空间字符串更优雅。