BizDoc.Authentication.Okta
7.3.2
See the version list below for details.
dotnet add package BizDoc.Authentication.Okta --version 7.3.2
NuGet\Install-Package BizDoc.Authentication.Okta -Version 7.3.2
<PackageReference Include="BizDoc.Authentication.Okta" Version="7.3.2" />
<PackageVersion Include="BizDoc.Authentication.Okta" Version="7.3.2" />
<PackageReference Include="BizDoc.Authentication.Okta" />
paket add BizDoc.Authentication.Okta --version 7.3.2
#r "nuget: BizDoc.Authentication.Okta, 7.3.2"
#:package BizDoc.Authentication.Okta@7.3.2
#addin nuget:?package=BizDoc.Authentication.Okta&version=7.3.2
#tool nuget:?package=BizDoc.Authentication.Okta&version=7.3.2
Okta for BizDoc
BizDoc supports Okta for both authentication and authorization, in one of two configurations: server flow or client flow.
Server flow redirects unauthorized users to Okta sign-in page on Okta domain, and handles the redirect. Client flow prompts unauthorized users for credentials in an hosted widget, and negotiate with Okta on the background.
- For both modes, install BizDoc Nuget package:
dotnet add package BizDoc.Core.Okta
- Add Okta application. If using server mode, choose Web Application. If using client mode, choose ODIC - OpenID Connect, and select SPA.
Okta sign-in redirect url should match "/authorization-code/callback" on server mode, and no path for client mode.
Create an API Token to allow BizDoc to retrieve users information.
- In startup.cs, add Okta service.
For server flow, use AddOktaRedirect:
AddBizDoc(o=> {
o.ApplicationUri = "https://app-domain";
})
.AddOktaServer(o=> {
o.ApiToken = "api-token";
o.Domain = "domain-name";
o.ClientId = "client-id";
o.ClientSecret = "client-secret";
});
...
UseBizDoc().
.UseOktaServer();
For client mode, use AddOkta:
AddBizDoc(...)
.AddOkta(o=> {
o.ApiToken = "api-token";
o.Domain = "domain-name";
}).
UseIdentityProvider();
The UseIdentityProvider() method registers an identity provider which retrieve user information from Okta. To use a different provider, while still authenticating via Okta, see Implementing Identity Provider.
- Client mode only, install Angular package:
npm i @bizdoc/okta
Add Okta configuration in Angular app.module:
OktaModule.forRoot({
domain: 'domain-name',
clientId: 'client-id'
})
Roles
In order to map user groups to BizDoc roles for authorization purposes, add a new claim to Okta Authorization Server with the following specifications.
Property | Value |
---|---|
Name | bizdoc.roles |
Include in token type | ID Token |
Value type | Groups |
Filter | Matches regex, .* |
Include in | Any scope |
System
Add an attribute to either application profile or all profiles and set its type to boolean. Add a claim in API server that map to the profile attribute you created.
Property | Value |
---|---|
Name | bizdoc.admin |
Include in token type | ID Token |
Value type | Expression |
Value | user.{attr-name-here} |
Widgets
Staff Performance, current user is manager.
Staff Pending, current user is manager.
Groups Performance, selected groups, or current user groups.
Attributes
Implicit user attributes for analysis axes.
Name | Usage |
---|---|
CostCenter | |
Department | |
Division | |
Organization | |
AdditionalProperty | PropertyName required. |
A type must be set for attributes in Architecture tool to enable the analysis to map to an axis.
Rules
User attribues available within rule expression.
Name | Usage |
---|---|
CostCenter | |
Department | |
Division | |
Organization | |
AdditionalProperty | PropertyName required. |
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net7.0 is compatible. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. net9.0 was computed. net9.0-android was computed. net9.0-browser was computed. net9.0-ios was computed. net9.0-maccatalyst was computed. net9.0-macos was computed. net9.0-tvos was computed. net9.0-windows was computed. net10.0 was computed. net10.0-android was computed. net10.0-browser was computed. net10.0-ios was computed. net10.0-maccatalyst was computed. net10.0-macos was computed. net10.0-tvos was computed. net10.0-windows was computed. |
-
net7.0
- Microsoft.AspNetCore.Authentication.JwtBearer (>= 7.0.8)
- Microsoft.AspNetCore.Authentication.OpenIdConnect (>= 7.0.8)
- Okta.Sdk (>= 7.0.0)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last Updated |
---|---|---|
9.0.1 | 134 | 6/20/2025 |
9.0.0 | 223 | 5/15/2025 |
8.14.7 | 156 | 3/18/2025 |
8.13.7 | 165 | 3/12/2025 |
8.13.6 | 113 | 2/27/2025 |
8.11.6 | 106 | 2/6/2025 |
8.10.6 | 115 | 1/20/2025 |
8.9.6 | 144 | 12/15/2024 |
8.9.5 | 117 | 12/2/2024 |
8.9.4 | 124 | 11/20/2024 |
8.9.3 | 117 | 10/13/2024 |
8.9.2 | 115 | 10/8/2024 |
8.8.1 | 153 | 9/17/2024 |
8.8.0 | 127 | 8/28/2024 |
8.7.0 | 94 | 7/29/2024 |
8.6.0 | 136 | 7/10/2024 |
8.5.15 | 144 | 5/28/2024 |
8.5.14 | 120 | 5/14/2024 |
8.5.13 | 141 | 4/23/2024 |
8.4.13 | 149 | 2/22/2024 |
8.4.12 | 144 | 2/20/2024 |
8.4.11 | 156 | 2/7/2024 |
8.4.10 | 137 | 2/2/2024 |
8.4.9 | 147 | 1/18/2024 |
8.4.8 | 151 | 1/12/2024 |
7.4.8 | 166 | 1/1/2024 |
7.4.7 | 166 | 1/1/2024 |
7.4.6 | 154 | 1/1/2024 |
7.4.5 | 191 | 12/31/2023 |
7.4.4 | 193 | 11/26/2023 |
7.4.3 | 157 | 11/22/2023 |
7.4.2 | 149 | 11/22/2023 |
7.3.2 | 173 | 8/14/2023 |
7.2.2 | 215 | 6/24/2023 |
7.1.2 | 197 | 6/2/2023 |
7.1.1 | 199 | 5/11/2023 |
7.1.0 | 192 | 5/4/2023 |
7.0.2 | 235 | 4/11/2023 |
7.0.1 | 264 | 3/30/2023 |
7.0.0 | 353 | 11/28/2022 |
6.8.11 | 375 | 11/8/2022 |
6.8.10 | 387 | 11/6/2022 |
6.8.8 | 400 | 10/31/2022 |
6.8.7 | 397 | 10/28/2022 |
6.8.6 | 408 | 10/27/2022 |
6.8.5 | 405 | 10/27/2022 |
6.8.4 | 439 | 10/24/2022 |
6.8.3 | 474 | 10/20/2022 |
6.8.2 | 455 | 10/20/2022 |