我一直在关注this教程,以便在我的WCF服务中使用传输安全性进行用户名身份验证。然而,该教程提到使用basicHttpBinding
这是不可接受的 - 我需要wsHttpBinding
。
这个想法是在WCF服务上有一个自定义BasicAuthenticationModule
,它将从HTTP请求中读取“Authorization”头,并根据“Authorization”头内容执行auth过程。问题是缺少“授权”标题!
我已经通过自定义行为实现了IClientMessageInspector
,以便操作传出消息并添加自定义SOAP标头。我在BeforeSendRequest
函数中添加了以下代码:
HttpRequestMessageProperty httpRequest = request.Properties.Where(x => x.Key == "httpRequest").Single().Value;
httpRequest.Headers.Add("CustomHeader", "CustomValue");
这应该有效,根据许多网络资源,它适用于basicHttpBinding
,但不适用于wsHttpBinding
。当我说“工作”时,我的意思是WCF服务成功接收了标头。
这是在WCF服务端检查收到的HTTP消息的简化函数:
public void OnAuthenticateRequest(object source, EventArgs eventArgs)
{
HttpApplication app = (HttpApplication)source;
//the Authorization header is checked if present
string authHeader = app.Request.Headers["Authorization"];
if (string.IsNullOrEmpty(authHeader))
{
app.Response.StatusCode = 401;
app.Response.End();
}
}
2011年9月发表的this帖子的帖子说wsHttpBinding
无法做到这一点。我不想接受这种回应。
作为旁注,如果我使用IIS中内置的基本身份验证模块而不是自定义模块,我会
参数'username'不得包含逗号。**尝试
Roles.IsInRole("RoleName")
或`[PrincipalPermission(SecurityAction.Demand,Role =“RoleName”)时的错误消息]
可能是因为我的PrimaryIdentity.Name
属性包含证书使用者名称,因为我使用TransportWithMessageCredential
安全性和基于证书的邮件安全性。
我愿意接受建议以及问题的替代方法。感谢。
更新
看起来,HTTP标头稍后会在整个WCF服务代码中正确读取。
(HttpRequestMessageProperty)OperationContext.Current.IncomingMessageProperties["httpRequest"]
包含我的自定义标头。但是,这已经是消息级别了。如何将标头传递给传输身份验证例程?
更新2
经过一番研究后,我得出结论,当一个Web浏览器收到HTTP状态代码401时,它会显示我登录对话框,我可以在其中指定我的凭据。但是,WCF客户端只是抛出异常而不想发送凭据。在Internet Explorer中访问https://myserver/myservice/service.svc
时,我能够验证此行为。尝试修复使用this链接中的信息,但无济于事。这是WCF中的错误还是我错过了什么?
修改
以下是我system.servicemodel
(来自web.config
)的相关部分 - 我很确定我已正确配置。
<serviceBehaviors>
<behavior name="ServiceBehavior">
<serviceMetadata httpsGetEnabled="true" httpGetEnabled="false" />
<serviceDebug includeExceptionDetailInFaults="true" />
<serviceCredentials>
<clientCertificate>
<authentication certificateValidationMode="ChainTrust" revocationMode="NoCheck" />
</clientCertificate>
<serviceCertificate findValue="server.uprava.djurkovic-co.me" x509FindType="FindBySubjectName" storeLocation="LocalMachine" storeName="My" />
</serviceCredentials>
<serviceAuthorization principalPermissionMode="UseAspNetRoles" roleProviderName="AspNetSqlRoleProvider" />
</behavior>
</serviceBehaviors>
................
<wsHttpBinding>
<binding name="EndPointWSHTTP" closeTimeout="00:01:00" openTimeout="00:01:00" receiveTimeout="00:10:00" sendTimeout="00:01:00" bypassProxyOnLocal="false" transactionFlow="false" hostNameComparisonMode="StrongWildcard" maxBufferPoolSize="20480000" maxReceivedMessageSize="20480000" messageEncoding="Text" textEncoding="utf-8" useDefaultWebProxy="true" allowCookies="false">
<readerQuotas maxDepth="20480000" maxStringContentLength="20480000" maxArrayLength="20480000" maxBytesPerRead="20480000" maxNameTableCharCount="20480000" />
<reliableSession ordered="true" inactivityTimeout="00:10:00" enabled="false" />
<security mode="TransportWithMessageCredential">
<transport clientCredentialType="Basic" />
<message clientCredentialType="Certificate" negotiateServiceCredential="true" algorithmSuite="Default" />
</security>
</binding>
</wsHttpBinding>
............
<service behaviorConfiguration="ServiceBehavior" name="DjurkovicService.Djurkovic">
<endpoint address="" binding="wsHttpBinding" bindingConfiguration="EndPointWSHTTP" name="EndPointWSHTTP" contract="DjurkovicService.IDjurkovic" />
</service>
该服务返回的例外是:
HTTP请求未经授权,客户端身份验证方案为“匿名”。从服务器收到的身份验证标头是“Basic Realm,Negotiate,NTLM”。 (远程服务器返回错误:(401)未经授权。)
答案 0 :(得分:2)
有趣的是,当我写下关于上述答案的最后评论时,我停了一会儿。我的评论包含“......如果HTTP标头不包含”授权“标头,我将状态设置为401,这会导致异常。” 我将状态设置为401。 知道了吗?解决方案一直存在。
即使我明确添加了初始数据包,它也不包含授权标头。但是,每个后续数据包都包含它,因为我在授权模块处于非活动状态时进行了测试。所以我,为什么我不尝试将这个初始数据包与其他数据包区分开来?因此,如果我发现它是初始数据包,请将HTTP状态代码设置为200(OK),如果不是,请检查身份验证标头。这很容易,因为初始数据包在SOAP信封中发送了对安全令牌的请求(包含<t:RequestSecurityToken>
标记)。
好的,让我们来看看我的实现,万一其他人需要它。
这是BasicAuthenticationModule实现,它实现了IHTTPModule:
public class UserAuthenticator : IHttpModule
{
public void Dispose()
{
}
public void Init(HttpApplication application)
{
application.AuthenticateRequest += new EventHandler(this.OnAuthenticateRequest);
application.EndRequest += new EventHandler(this.OnEndRequest);
}
public void OnAuthenticateRequest(object source, EventArgs eventArgs)
{
HttpApplication app = (HttpApplication)source;
// Get the request stream
Stream httpStream = app.Request.InputStream;
// I converted the stream to string so I can search for a known substring
byte[] byteStream = new byte[httpStream.Length];
httpStream.Read(byteStream, 0, (int)httpStream.Length);
string strRequest = Encoding.ASCII.GetString(byteStream);
// This is the end of the initial SOAP envelope
// Not sure if the fastest way to do this but works fine
int idx = strRequest.IndexOf("</t:RequestSecurityToken></s:Body></s:Envelope>", 0);
httpStream.Seek(0, SeekOrigin.Begin);
if (idx != -1)
{
// Initial packet found, do nothing (HTTP status code is set to 200)
return;
}
//the Authorization header is checked if present
string authHeader = app.Request.Headers["Authorization"];
if (!string.IsNullOrEmpty(authHeader))
{
if (authHeader == null || authHeader.Length == 0)
{
// No credentials; anonymous request
return;
}
authHeader = authHeader.Trim();
if (authHeader.IndexOf("Basic", 0) != 0)
{
// the header doesn't contain basic authorization token
// we will pass it along and
// assume someone else will handle it
return;
}
string encodedCredentials = authHeader.Substring(6);
byte[] decodedBytes = Convert.FromBase64String(encodedCredentials);
string s = new ASCIIEncoding().GetString(decodedBytes);
string[] userPass = s.Split(new char[] { ':' });
string username = userPass[0];
string password = userPass[1];
// the user is validated against the SqlMemberShipProvider
// If it is validated then the roles are retrieved from
// the role provider and a generic principal is created
// the generic principal is assigned to the user context
// of the application
if (Membership.ValidateUser(username, password))
{
string[] roles = Roles.GetRolesForUser(username);
app.Context.User = new GenericPrincipal(new
GenericIdentity(username, "Membership Provider"), roles);
}
else
{
DenyAccess(app);
return;
}
}
else
{
app.Response.StatusCode = 401;
app.Response.End();
}
}
public void OnEndRequest(object source, EventArgs eventArgs)
{
// The authorization header is not present.
// The status of response is set to 401 Access Denied.
// We will now add the expected authorization method
// to the response header, so the client knows
// it needs to send credentials to authenticate
if (HttpContext.Current.Response.StatusCode == 401)
{
HttpContext context = HttpContext.Current;
context.Response.AddHeader("WWW-Authenticate", "Basic Realm");
}
}
private void DenyAccess(HttpApplication app)
{
app.Response.StatusCode = 403;
app.Response.StatusDescription = "Forbidden";
// Write to response stream as well, to give the user
// visual indication of error
app.Response.Write("403 Forbidden");
app.CompleteRequest();
}
}
重要提示:为了使我们能够阅读http请求流,必须启用ASP.NET兼容性 。
要使IIS加载此模块,必须将其添加到web.config的<system.webServer>
部分,如下所示:
<system.webServer>
<modules runAllManagedModulesForAllRequests="true">
<remove name="BasicAuthenticationModule" />
<add name="BasicAuthenticationModule" type="UserAuthenticator" />
</modules>
但在此之前,您必须确保BasicAuthenticationModule
部分未被锁定,并且默认情况下应该将其锁定。如果它被锁定,你将无法更换它。
解锁模块:(注意:我使用的是IIS 7.5)
在客户端,您需要能够向外发邮件添加自定义HTTP标头。执行此操作的最佳方法是实现IClientMessageInspector并使用BeforeSendRequest
函数添加标头。我不会解释如何实现IClientMessageInspector,在线提供了大量有关该主题的资源。
要在邮件中添加“Authorization”HTTP标头,请执行以下操作:
public object BeforeSendRequest(ref Message request, IClientChannel channel)
{
// Making sure we have a HttpRequestMessageProperty
HttpRequestMessageProperty httpRequestMessageProperty;
if (request.Properties.ContainsKey(HttpRequestMessageProperty.Name))
{
httpRequestMessageProperty = request.Properties[HttpRequestMessageProperty.Name] as HttpRequestMessageProperty;
if (httpRequestMessageProperty == null)
{
httpRequestMessageProperty = new HttpRequestMessageProperty();
request.Properties.Add(HttpRequestMessageProperty.Name, httpRequestMessageProperty);
}
}
else
{
httpRequestMessageProperty = new HttpRequestMessageProperty();
request.Properties.Add(HttpRequestMessageProperty.Name, httpRequestMessageProperty);
}
// Add the authorization header to the WCF request
httpRequestMessageProperty.Headers.Add("Authorization", "Basic " + Convert.ToBase64String(Encoding.ASCII.GetBytes(Service.Proxy.ClientCredentials.UserName.UserName + ":" + Service.Proxy.ClientCredentials.UserName.Password)));
return null;
}
你去了,需要一段时间才能解决,但这是值得的,因为我在整个网络上发现了许多类似的未解答的问题。
答案 1 :(得分:0)
您正在尝试实施 HTTP 身份验证,因此请查看此MSDN article以确保您已正确配置服务。正如您所知,您引用的教程适用于basicHttpBinding,但wsHttpBinding需要特殊配置才能支持HTTP身份验证。