Indiko.Blocks.Security.Authentication.ASPNetCore 2.1.2

dotnet add package Indiko.Blocks.Security.Authentication.ASPNetCore --version 2.1.2
                    
NuGet\Install-Package Indiko.Blocks.Security.Authentication.ASPNetCore -Version 2.1.2
                    
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Indiko.Blocks.Security.Authentication.ASPNetCore" Version="2.1.2" />
                    
For projects that support PackageReference, copy this XML node into the project file to reference the package.
<PackageVersion Include="Indiko.Blocks.Security.Authentication.ASPNetCore" Version="2.1.2" />
                    
Directory.Packages.props
<PackageReference Include="Indiko.Blocks.Security.Authentication.ASPNetCore" />
                    
Project file
For projects that support Central Package Management (CPM), copy this XML node into the solution Directory.Packages.props file to version the package.
paket add Indiko.Blocks.Security.Authentication.ASPNetCore --version 2.1.2
                    
#r "nuget: Indiko.Blocks.Security.Authentication.ASPNetCore, 2.1.2"
                    
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
#:package Indiko.Blocks.Security.Authentication.ASPNetCore@2.1.2
                    
#:package directive can be used in C# file-based apps starting in .NET 10 preview 4. Copy this into a .cs file before any lines of code to reference the package.
#addin nuget:?package=Indiko.Blocks.Security.Authentication.ASPNetCore&version=2.1.2
                    
Install as a Cake Addin
#tool nuget:?package=Indiko.Blocks.Security.Authentication.ASPNetCore&version=2.1.2
                    
Install as a Cake Tool

Indiko.Blocks.Security.Authentication.ASPNetCore

JWT Bearer authentication implementation for ASP.NET Core APIs with token generation and validation.

Overview

This package provides complete JWT (JSON Web Token) authentication for ASP.NET Core applications, including token generation, validation, and SignalR hub support.

Features

  • JWT Bearer Authentication: Standard JWT token authentication
  • Token Generation: Built-in token provider
  • Token Validation: Automatic token validation middleware
  • SignalR Support: Query string token support for SignalR hubs
  • Configurable Validation: Control issuer, audience, lifetime validation
  • Development Mode: Relaxed HTTPS requirements in development
  • Comprehensive Logging: Detailed authentication event logging

Installation

dotnet add package Indiko.Blocks.Security.Authentication.ASPNetCore

Configuration

appsettings.json

{
  "AspNetCoreAuthenticationOptions": {
    "Enabled": true,
    "Secret": "your-256-bit-secret-key-minimum-32-characters",
    "Issuer": "https://api.example.com",
    "Audience": "api.example.com",
    "ValidateIssuer": true,
    "ValidateAudience": true,
    "ValidateLifetime": true,
    "ValidateIssuerSigningKey": true,
    "TokenExpirationMinutes": 60,
    "RefreshTokenExpirationDays": 7,
    "SignalRHubPath": "/hubs"
  }
}

Quick Start

// Authentication is auto-configured via block system
// Just ensure appsettings.json has the configuration above

Token Generation

Using ITokenProvider

[ApiController]
[Route("api/[controller]")]
public class AuthController : ControllerBase
{
    private readonly ITokenProvider _tokenProvider;
    private readonly IUserService _userService;

    public AuthController(ITokenProvider tokenProvider, IUserService userService)
    {
        _tokenProvider = tokenProvider;
        _userService = userService;
    }

    [HttpPost("login")]
    [AllowAnonymous]
    public async Task<IActionResult> Login([FromBody] LoginRequest request)
    {
        // Validate credentials
        var user = await _userService.ValidateCredentialsAsync(
            request.Username, 
            request.Password);

        if (user == null)
            return Unauthorized(new { message = "Invalid credentials" });

        // Create identity user
        var identityUser = new IdentityUser
        {
            UserId = user.Id.ToString(),
            Username = user.Username,
            Email = user.Email,
            Roles = new[] { "User", "Admin" }
        };

        // Generate tokens
        var tokenResponse = await _tokenProvider.GetToken(identityUser);

        return Ok(new
        {
            access_token = tokenResponse.AccessToken,
            token_type = "Bearer",
            expires_in = 3600,
            refresh_token = tokenResponse.RefreshToken
        });
    }
}

With Custom Claims

[HttpPost("login-with-claims")]
public async Task<IActionResult> LoginWithClaims([FromBody] LoginRequest request)
{
    var user = await _userService.ValidateCredentialsAsync(request.Username, request.Password);
    if (user == null) return Unauthorized();

    var identityUser = new IdentityUser
    {
        UserId = user.Id.ToString(),
        Username = user.Username,
        Email = user.Email,
        Roles = user.Roles.ToArray()
    };

    var customClaims = new Dictionary<string, string>
    {
        { "tenant_id", user.TenantId.ToString() },
        { "subscription_tier", user.SubscriptionTier },
        { "permissions", string.Join(",", user.Permissions) }
    };

    var tokenResponse = await _tokenProvider.GetToken(identityUser, customClaims);
    return Ok(tokenResponse);
}

Protected Endpoints

Require Authentication

[ApiController]
[Route("api/[controller]")]
[Authorize]  // Requires valid JWT token
public class UsersController : ControllerBase
{
    [HttpGet]
    public IActionResult GetUsers()
    {
        return Ok(users);
    }

    [HttpGet("me")]
    public IActionResult GetCurrentUser()
    {
        var userId = User.FindFirst(ClaimTypes.NameIdentifier)?.Value;
        var username = User.FindFirst(ClaimTypes.Name)?.Value;
        var email = User.FindFirst(ClaimTypes.Email)?.Value;

        return Ok(new { userId, username, email });
    }
}

Role-Based Authorization

[Authorize(Roles = "Admin")]
[HttpDelete("{id}")]
public IActionResult DeleteUser(Guid id)
{
    // Only admins can delete
    return NoContent();
}

[Authorize(Roles = "Admin,Moderator")]
[HttpPut("{id}/ban")]
public IActionResult BanUser(Guid id)
{
    // Admins or Moderators can ban
    return NoContent();
}

Policy-Based Authorization

// In Startup.cs
services.AddAuthorization(options =>
{
    options.AddPolicy("RequireAdminRole", policy =>
        policy.RequireRole("Admin"));

    options.AddPolicy("RequirePremium", policy =>
        policy.RequireClaim("subscription_tier", "Premium", "Enterprise"));

    options.AddPolicy("MinimumAge", policy =>
        policy.Requirements.Add(new MinimumAgeRequirement(18)));
});

// In Controller
[Authorize(Policy = "RequirePremium")]
[HttpGet("premium-content")]
public IActionResult GetPremiumContent()
{
    return Ok(premiumContent);
}

SignalR Hub Authentication

The block automatically supports SignalR hub authentication via query strings:

// Client-side JavaScript
const connection = new signalR.HubConnectionBuilder()
    .withUrl("/hubs/chat", {
        accessTokenFactory: () => localStorage.getItem("access_token")
    })
    .build();

await connection.start();

Secured Hub

[Authorize]
public class ChatHub : Hub
{
    public override async Task OnConnectedAsync()
    {
        var username = Context.User?.Identity?.Name;
        Console.WriteLine($"{username} connected");
        await base.OnConnectedAsync();
    }

    public async Task SendMessage(string message)
    {
        var username = Context.User?.Identity?.Name;
        await Clients.All.SendAsync("ReceiveMessage", username, message);
    }
}

Token Validation

Tokens are automatically validated on every request to protected endpoints:

  1. Signature: Verified using the secret key
  2. Expiration: Checked if ValidateLifetime is true
  3. Issuer: Validated if ValidateIssuer is true
  4. Audience: Validated if ValidateAudience is true

Manual Validation

public class TokenValidator
{
    private readonly AspNetCoreAuthenticationOptions _options;

    public bool ValidateToken(string token, out ClaimsPrincipal principal)
    {
        var tokenHandler = new JwtSecurityTokenHandler();
        principal = null;

        try
        {
            var validationParameters = new TokenValidationParameters
            {
                ValidateIssuer = _options.ValidateIssuer,
                ValidateAudience = _options.ValidateAudience,
                ValidateLifetime = _options.ValidateLifetime,
                ValidIssuer = _options.Issuer,
                ValidAudience = _options.Audience,
                IssuerSigningKey = new SymmetricSecurityKey(
                    Encoding.UTF8.GetBytes(_options.Secret))
            };

            principal = tokenHandler.ValidateToken(token, validationParameters, out _);
            return true;
        }
        catch
        {
            return false;
        }
    }
}

Client Usage

JavaScript/TypeScript

// Login
const response = await fetch('/api/auth/login', {
    method: 'POST',
    headers: { 'Content-Type': 'application/json' },
    body: JSON.stringify({ username: 'user', password: 'pass' })
});

const { access_token } = await response.json();
localStorage.setItem('access_token', access_token);

// Protected request
const data = await fetch('/api/users', {
    headers: {
        'Authorization': `Bearer ${localStorage.getItem('access_token')}`
    }
});

C# HttpClient

var client = new HttpClient();
client.DefaultRequestHeaders.Authorization = 
    new AuthenticationHeaderValue("Bearer", accessToken);

var response = await client.GetAsync("https://api.example.com/api/users");

Refresh Tokens

[HttpPost("refresh")]
public async Task<IActionResult> RefreshToken([FromBody] RefreshTokenRequest request)
{
    // Validate refresh token
    var storedToken = await _tokenRepository.GetByTokenAsync(request.RefreshToken);
    if (storedToken == null || storedToken.IsExpired)
        return Unauthorized(new { message = "Invalid refresh token" });

    // Get user
    var user = await _userService.GetByIdAsync(storedToken.UserId);

    var identityUser = new IdentityUser
    {
        UserId = user.Id.ToString(),
        Username = user.Username,
        Email = user.Email,
        Roles = user.Roles.ToArray()
    };

    // Generate new tokens
    var tokenResponse = await _tokenProvider.GetToken(identityUser);

    // Revoke old refresh token
    await _tokenRepository.RevokeAsync(request.RefreshToken);

    return Ok(tokenResponse);
}

Event Logging

The block logs detailed authentication events:

  • OnMessageReceived: Token received from request
  • OnTokenValidated: Token successfully validated
  • OnAuthenticationFailed: Authentication failure
  • OnChallenge: Authentication challenge issued
  • OnForbidden: Access denied

Best Practices

  1. Strong Secrets: Use 256-bit (32+ characters) secret keys
  2. HTTPS: Always use HTTPS in production
  3. Short Expiration: Keep access token expiration short (15-60 minutes)
  4. Refresh Tokens: Implement refresh token flow
  5. Secure Storage: Don't log or expose secret keys
  6. Environment-Specific: Different secrets per environment

Target Framework

  • .NET 10

Dependencies

  • Indiko.Blocks.Security.Authentication.Abstractions
  • Microsoft.AspNetCore.Authentication.JwtBearer
  • System.IdentityModel.Tokens.Jwt

License

See LICENSE file in the repository root.

  • Indiko.Blocks.Security.Authentication.Abstractions - Authentication abstractions
  • Indiko.Blocks.Security.AuthenticationProvider.Blazor - Blazor authentication
  • Indiko.Hosting.Web - Web API hosting
Product Compatible and additional computed target framework versions.
.NET net10.0 is compatible.  net10.0-android was computed.  net10.0-browser was computed.  net10.0-ios was computed.  net10.0-maccatalyst was computed.  net10.0-macos was computed.  net10.0-tvos was computed.  net10.0-windows was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last Updated
2.1.2 265 12/18/2025
2.1.1 667 12/2/2025
2.1.0 656 12/2/2025
2.0.0 280 9/17/2025
1.7.23 178 9/8/2025
1.7.22 175 9/8/2025
1.7.21 186 8/14/2025
1.7.20 201 6/23/2025
1.7.19 171 6/3/2025
1.7.18 175 5/29/2025
1.7.17 193 5/26/2025
1.7.15 131 4/12/2025
1.7.14 156 4/11/2025
1.7.13 155 3/29/2025
1.7.12 166 3/28/2025
1.7.11 164 3/28/2025
1.7.10 169 3/28/2025
1.7.9 167 3/28/2025
1.7.8 151 3/28/2025
1.7.5 189 3/17/2025
1.7.4 160 3/16/2025
1.7.3 175 3/16/2025
1.7.2 185 3/16/2025
1.7.1 207 3/11/2025
1.6.8 210 3/11/2025
1.6.7 253 3/4/2025
1.6.6 142 2/26/2025
1.6.5 154 2/20/2025
1.6.4 130 2/20/2025
1.6.3 150 2/5/2025
1.6.2 145 1/24/2025
1.6.1 134 1/24/2025
1.6.0 137 1/16/2025
1.5.2 142 1/16/2025
1.5.1 175 11/3/2024
1.5.0 152 10/26/2024
1.3.2 150 10/24/2024
1.3.0 145 10/10/2024
1.2.5 157 10/9/2024
1.2.4 138 10/8/2024
1.2.1 145 10/3/2024
1.2.0 173 9/29/2024
1.1.1 148 9/23/2024
1.1.0 169 9/18/2024
1.0.33 159 9/15/2024
1.0.28 158 8/28/2024
1.0.27 184 8/24/2024
1.0.26 168 7/7/2024
1.0.25 172 7/6/2024
1.0.24 165 6/25/2024
1.0.23 187 6/1/2024
1.0.22 175 5/14/2024
1.0.21 150 5/14/2024
1.0.20 182 4/8/2024
1.0.19 166 4/3/2024
1.0.18 185 3/23/2024
1.0.17 168 3/19/2024
1.0.16 173 3/19/2024
1.0.15 200 3/11/2024
1.0.14 185 3/10/2024
1.0.13 185 3/6/2024
1.0.12 218 3/1/2024
1.0.11 172 3/1/2024
1.0.10 178 3/1/2024
1.0.9 166 3/1/2024
1.0.8 189 2/19/2024
1.0.7 182 2/17/2024
1.0.6 192 2/17/2024
1.0.5 185 2/17/2024
1.0.4 182 2/7/2024
1.0.3 176 2/6/2024
1.0.1 162 2/6/2024
1.0.0 222 1/9/2024
1.0.0-preview99 200 12/22/2023
1.0.0-preview98 161 12/21/2023
1.0.0-preview97 161 12/21/2023
1.0.0-preview96 163 12/20/2023
1.0.0-preview95 155 12/20/2023
1.0.0-preview94 160 12/18/2023
1.0.0-preview93 171 12/13/2023
1.0.0-preview92 161 12/13/2023
1.0.0-preview91 162 12/12/2023
1.0.0-preview90 170 12/11/2023
1.0.0-preview89 172 12/11/2023
1.0.0-preview88 190 12/6/2023
1.0.0-preview87 156 12/6/2023
1.0.0-preview86 172 12/6/2023
1.0.0-preview85 167 12/6/2023
1.0.0-preview84 177 12/5/2023
1.0.0-preview83 173 12/5/2023
1.0.0-preview82 167 12/5/2023
1.0.0-preview81 170 12/4/2023
1.0.0-preview80 156 12/1/2023
1.0.0-preview77 163 12/1/2023
1.0.0-preview76 160 12/1/2023
1.0.0-preview75 163 12/1/2023
1.0.0-preview74 174 11/26/2023
1.0.0-preview73 179 11/7/2023
1.0.0-preview72 170 11/6/2023
1.0.0-preview71 173 11/3/2023
1.0.0-preview70 164 11/2/2023
1.0.0-preview69 152 11/2/2023
1.0.0-preview68 163 11/2/2023
1.0.0-preview67 154 11/2/2023
1.0.0-preview66 151 11/2/2023
1.0.0-preview65 170 11/2/2023
1.0.0-preview64 169 11/2/2023
1.0.0-preview63 149 11/2/2023
1.0.0-preview62 174 11/1/2023
1.0.0-preview61 150 11/1/2023
1.0.0-preview60 172 11/1/2023
1.0.0-preview59 161 11/1/2023
1.0.0-preview58 164 10/31/2023
1.0.0-preview57 166 10/31/2023
1.0.0-preview56 159 10/31/2023
1.0.0-preview55 167 10/31/2023
1.0.0-preview54 150 10/31/2023
1.0.0-preview53 137 10/31/2023
1.0.0-preview52 162 10/31/2023
1.0.0-preview51 154 10/31/2023
1.0.0-preview50 167 10/31/2023
1.0.0-preview48 167 10/31/2023
1.0.0-preview46 177 10/31/2023
1.0.0-preview45 150 10/31/2023
1.0.0-preview44 160 10/31/2023
1.0.0-preview43 153 10/31/2023
1.0.0-preview42 158 10/30/2023
1.0.0-preview41 158 10/30/2023
1.0.0-preview40 173 10/27/2023
1.0.0-preview39 173 10/27/2023
1.0.0-preview38 160 10/27/2023
1.0.0-preview37 175 10/27/2023
1.0.0-preview36 157 10/27/2023
1.0.0-preview35 144 10/27/2023
1.0.0-preview34 147 10/27/2023
1.0.0-preview33 162 10/26/2023
1.0.0-preview32 169 10/26/2023
1.0.0-preview101 150 1/5/2024