ASP.Net Core Cookie身份验证不持久

时间:2019-06-07 08:18:08

标签: c# authentication asp.net-core cookie-authentication

我开始使用 ASP.Net Core 2.2 开发网站。 我正在通过自定义Cookie身份验证(而非身份)实现登录/注销。

请查看或克隆the repo

git clone https://github.com/mrmowji/aspcore-custom-cookie-authentication.git .

...或阅读以下代码段。

这是Startup.cs中的代码:

public void ConfigureServices(IServiceCollection services) {
  ...

  services.AddAuthentication(CookieAuthenticationDefaults.AuthenticationScheme)
    .AddCookie(options => {
      options.LoginPath = new PathString("/login");
      options.ExpireTimeSpan = TimeSpan.FromDays(30);
      options.Cookie.Expiration = TimeSpan.FromDays(30);
      options.SlidingExpiration = true;
    });

  ...

public void Configure(IApplicationBuilder app, IHostingEnvironment env) {
  ...

  app.UseHttpsRedirection();
  app.UseStaticFiles();
  app.UseCookiePolicy();

  app.UseAuthentication();

  app.UseMvc(routes =>
  {
    ...

这是Login操作的代码:

public async Task<IActionResult> Login(LoginViewModel userToLogin) {
  var username = "username"; // just to test
  var password = "password"; // just to test
  if (userToLogin.UserName == username && userToLogin.Password == password) {
    var claims = new List<Claim> {
      new Claim(ClaimTypes.Name, "admin"),
      new Claim(ClaimTypes.Role, "Administrator"),
    };

  var claimsIdentity = new ClaimsIdentity(
    claims, CookieAuthenticationDefaults.AuthenticationScheme);

  var authProperties = new AuthenticationProperties {
    AllowRefresh = true,
    ExpiresUtc = DateTimeOffset.UtcNow.AddDays(10),
    IsPersistent = true,
  };

  await HttpContext.SignInAsync(
    CookieAuthenticationDefaults.AuthenticationScheme,
    new ClaimsPrincipal(claimsIdentity),
    authProperties);

    ...

Cookie已按预期设置。我有一个.AspNetCore.Cookies Cookie,其有效期为10天。但是大约30分钟后,用户将注销。即使浏览器关闭后,如何强制经过身份验证的用户保持登录状态?

1 个答案:

答案 0 :(得分:1)

感谢@LeonardoSeccia,我找到了答案。请阅读有关主要问题的评论。

我只需要在ConfigureServices方法内添加data protection服务,并提供一种在某些地方存储/保留密钥(用于加密/解密敏感数据的密钥)的方法,否则无论服务器还是服务器应用程序池重新启动,将生成新密钥,并且旧的加密数据(包括身份验证Cookie)将无法按其必须的方式解密,从而导致身份验证失败。如果要部署到像我这样的共享主机,则很有必要。

如果您以前使用过.Net Framework中的ASP.Net,则此数据保护概念在某种程度上等效于MachineKey

我已决定use a file to store the keys。 这是Startup.cs中的最终更改:

public Startup(IConfiguration configuration, IHostingEnvironment environment) {
  Configuration = configuration;
  hostingEnvironment = environment;
}

private IHostingEnvironment hostingEnvironment;

public IConfiguration Configuration { get; }

// This method gets called by the runtime. Use this method to add services to the container.
public void ConfigureServices(IServiceCollection services) {
  // create a directory for keys if it doesn't exist
  // it'll be created in the root, beside the wwwroot directory
  var keysDirectoryName = "Keys";
  var keysDirectoryPath = Path.Combine(hostingEnvironment.ContentRootPath, keysDirectoryName);
  if (!Directory.Exists(keysDirectoryPath)) {
    Directory.CreateDirectory(keysDirectoryPath);
  }
  services.AddDataProtection()
    .PersistKeysToFileSystem(new DirectoryInfo(keysDirectoryPath))
    .SetApplicationName("CustomCookieAuthentication");

  services.Configure<CookiePolicyOptions>(options =>
  {
  ...

如果需要完整的源代码,请签出the repo