Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/curityio/example-dotnet-openid-connect-client
An example website that implements OAuth 2.0 and OpenID Connect with the .NET Framework
https://github.com/curityio/example-dotnet-openid-connect-client
code-example dotnet dotnet-framework oauth2 openid-connect website
Last synced: about 2 months ago
JSON representation
An example website that implements OAuth 2.0 and OpenID Connect with the .NET Framework
- Host: GitHub
- URL: https://github.com/curityio/example-dotnet-openid-connect-client
- Owner: curityio
- License: apache-2.0
- Created: 2017-10-04T05:55:54.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-05-09T16:58:10.000Z (over 1 year ago)
- Last Synced: 2024-05-03T11:03:45.028Z (9 months ago)
- Topics: code-example, dotnet, dotnet-framework, oauth2, openid-connect, website
- Language: C#
- Homepage: https://curity.io/resources/learn/dotnetframework-openid-connect-client/
- Size: 271 KB
- Stars: 30
- Watchers: 5
- Forks: 10
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# OpenID Connect Demo
[![Quality](https://img.shields.io/badge/quality-demo-red)](https://curity.io/resources/code-examples/status/)
[![Availability](https://img.shields.io/badge/availability-source-blue)](https://curity.io/resources/code-examples/status/)This is a .NET framework demo application to explain how the OpenID Connect code flow is implemented.\
See the tutorial on the [Curity Web Site](https://curity.io/resources/learn/dotnetframework-openid-connect-client/) for further details.## web.config
web.config is used as a configuration file for the example app. Change the values to match your system.Name | Type | Mandatory | Default | Description
----------------| ------- | :-------: | -------- | :---------------
`redirect_uri` | string | ✓ | | The redirect uri to use, must be registered for the client at the OpenID Connect server.
`client_id` | string | ✓ | | The id for the client. Used to authenticate the client against the authorization server endpoint.
`client_secret` | string | ✓ | | The shared secret to use for authentication against the token endpoint.
`scope` | string | | `openid` | The scopes to ask for.
`jwks_uri` | URL | if `issuer` is not set and the `openid` scope is requested | | The URL that points to the JWK set.
`authorization_endpoint` | URL | if `issuer` is not set | | The URL to the authorization_endpoint.
`token_endpoint`| URL | if `issuer` is not set | | The URL to the token_endpoint.
`issuer` | string | if the `openid` scope is requested. | | The ID of the token issuer. This enables metadata discovery which will override the configuration set up in this file.
`base_url` | string | | | base url to be added to internal redirects. Set this to enable the client to be behind a proxy.## Questions and Support
For questions and support, contact Curity AB:
> Curity AB
>
> [email protected]
> https://curity.ioCopyright (C) 2016 Curity AB.