Keycloak.AuthServices.Authorization
1.4.1
Prefix Reserved
See the version list below for details.
dotnet add package Keycloak.AuthServices.Authorization --version 1.4.1
NuGet\Install-Package Keycloak.AuthServices.Authorization -Version 1.4.1
<PackageReference Include="Keycloak.AuthServices.Authorization" Version="1.4.1" />
paket add Keycloak.AuthServices.Authorization --version 1.4.1
#r "nuget: Keycloak.AuthServices.Authorization, 1.4.1"
// Install Keycloak.AuthServices.Authorization as a Cake Addin #addin nuget:?package=Keycloak.AuthServices.Authorization&version=1.4.1 // Install Keycloak.AuthServices.Authorization as a Cake Tool #tool nuget:?package=Keycloak.AuthServices.Authorization&version=1.4.1
Keycloak.AuthServices
Easy Authentication and Authorization with Keycloak in .NET and ASP.NET Core.
| Package | Version | Description |
|----------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------------|
| Keycloak.AuthServices.Authentication
| | Keycloak Authentication JWT + OICD |
| Keycloak.AuthServices.Authorization
| | Authorization Services. Use Keycloak as authorization server |
| Keycloak.AuthServices.Sdk
| | HTTP API integration with Keycloak |
Example
Demonstrates how to add JWT-based authentication and custom authorization policy.
var builder = WebApplication.CreateBuilder(args);
var host = builder.Host;
var configuration = builder.Configuration;
var services = builder.Services;
host.ConfigureKeycloakConfigurationSource();
// conventional registration from keycloak.json
services.AddKeycloakAuthentication(configuration);
services.AddAuthorization(options =>
{
options.AddPolicy("RequireWorkspaces", builder =>
{
builder.RequireProtectedResource("workspaces", "workspaces:read") // HTTP request to Keycloak to check protected resource
.RequireRealmRoles("User") // Realm role is fetched from token
.RequireResourceRoles("Admin"); // Resource/Client role is fetched from token
});
})
.AddKeycloakAuthorization(configuration);
var app = builder.Build();
app.UseAuthentication()
.UseAuthorization();
app.MapGet("/workspaces", () => "[]")
.RequireAuthorization("RequireWorkspaces");
app.Run();
Keycloak.AuthServices.Authentication
Keycloak.AuthServices.Authentication
Add OpenID Connect + JWT Bearer token authentication.
// add configuration from keycloak file
host.ConfigureKeycloakConfigurationSource("keycloak.json");
// add authentication services, OICD JwtBearerDefaults.AuthenticationScheme
services.AddKeycloakAuthentication(configuration, o =>
{
o.RequireHttpsMetadata = false;
});
Client roles are automatically transformed into user role claims KeycloakRolesClaimsTransformation.
See Keycloak.AuthServices.Authentication - README.md
Keycloak installation file:
// confidential client
{
"realm": "<realm>",
"auth-server-url": "http://localhost:8088/auth/",
"ssl-required": "external", // external | none
"resource": "<clientId>",
"verify-token-audience": true,
"credentials": {
"secret": ""
}
}
// public client
{
"realm": "<realm>",
"auth-server-url": "http://localhost:8088/auth/",
"ssl-required": "external",
"resource": "<clientId>",
"public-client": true,
"confidential-port": 0
}
Keycloak.AuthServices.Authorization
Keycloak.AuthServices.Authorization
services.AddAuthorization(authOptions =>
{
authOptions.AddPolicy("<policyName>", policyBuilder =>
{
// configure policies here
});
}).AddKeycloakAuthorization(configuration);
See Keycloak.AuthServices.Authorization - README.md
Keycloak.AuthServices.Sdk
Keycloak API clients.
Service | Description |
---|---|
IKeycloakClient | Unified HTTP client - IKeycloakRealmClient, IKeycloakProtectedResourceClient |
IKeycloakRealmClient | Keycloak realm API |
IKeycloakProtectedResourceClient | Protected resource API |
IKeycloakUserClient | Keycloak user API |
IKeycloakProtectionClient | Authorization server API, used by AddKeycloakAuthorization |
// requires confidential client
services.AddKeycloakAdminHttpClient(keycloakOptions);
// based on token forwarding HttpClient middleware and IHttpContextAccessor
services.AddKeycloakProtectionHttpClient(keycloakOptions);
See Keycloak.AuthServices.Sdk - README.md
Build and Development
dotnet cake --target build
dotnet pack -o ./Artefacts
Blog Posts
Reference
- https://github.com/thinktecture-labs/webinar-keycloak
- https://github.com/thinktecture-labs/webinar-keycloak-authorization
- https://github.com/elmankross/Jboss.AspNetCore.Authentication.Keycloak/
- https://github.com/mikemir/AspNetCore.KeycloakAuthentication/
- https://github.com/lvermeulen/Keycloak.Net
- https://github.com/keycloak/keycloak-documentation/blob/main/authorization_services/topics/service-authorization-uma-authz-process.adoc
- https://www.keycloak.org/docs/latest/authorization_services/index.html
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net6.0
- Microsoft.AspNetCore.Authentication.Abstractions (>= 2.2.0)
- Microsoft.AspNetCore.Authentication.JwtBearer (>= 6.0.1)
- Microsoft.AspNetCore.Authorization (>= 6.0.1)
NuGet packages (7)
Showing the top 5 NuGet packages that depend on Keycloak.AuthServices.Authorization:
Package | Downloads |
---|---|
Gathrr.Framework.Infrastructure
Package Description |
|
Wcz.Layout
Package Description |
|
Inspire.Framework.Infrastructure
Package Description |
|
Feijuca.Keycloak.MultiTenancy
This project has a quickly purpose: Extend the behavior of keycloak-authorization-services-dotnet but adding a multi-tenancy support. |
|
Feijuca.Auth
Feijuca.Auth simplifies Keycloak integration for user management and multi-tenancy. It features TokenManager for centralized API calls to manage users and auth services for handling multiple tenants using Keycloak realms. Check the documentation for more details! |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2.5.3 | 37,782 | 8/19/2024 |
2.5.2 | 57,977 | 6/15/2024 |
2.5.1 | 2,972 | 6/11/2024 |
2.5.0 | 9,387 | 6/2/2024 |
2.4.1 | 11,058 | 5/16/2024 |
2.4.0 | 1,093 | 5/12/2024 |
2.3.0 | 338 | 5/10/2024 |
2.3.0-pre-1 | 75 | 5/9/2024 |
2.2.1 | 759 | 5/9/2024 |
2.2.0 | 164 | 5/8/2024 |
2.1.0 | 2,825 | 5/7/2024 |
2.0.0 | 1,993 | 5/5/2024 |
2.0.0-pre-4 | 117 | 5/4/2024 |
2.0.0-pre-3 | 191 | 4/26/2024 |
2.0.0-pre-2 | 101 | 4/25/2024 |
2.0.0-pre-1 | 223 | 4/24/2024 |
1.6.0 | 228,805 | 10/25/2023 |
1.5.2 | 157,884 | 5/27/2023 |
1.5.1 | 213,043 | 1/17/2023 |
1.5.0 | 625 | 1/17/2023 |
1.4.1 | 2,070 | 1/12/2023 |
1.4.0 | 5,462 | 1/4/2023 |
1.3.0 | 1,448 | 12/28/2022 |
1.2.1 | 34,640 | 9/22/2022 |
1.2.0 | 2,850 | 8/24/2022 |
1.1.0 | 13,091 | 1/30/2022 |
1.0.5 | 140 | 1/29/2022 |
1.0.4 | 139 | 1/28/2022 |
1.0.3 | 132 | 1/28/2022 |
1.0.2 | 136 | 1/23/2022 |
1.0.1 | 604 | 1/19/2022 |
1.0.0 | 4,355 | 1/19/2022 |