Nedo.AspNet.Authentication.Claims 2.0.6

There is a newer version of this package available.
See the version list below for details.
dotnet add package Nedo.AspNet.Authentication.Claims --version 2.0.6
                    
NuGet\Install-Package Nedo.AspNet.Authentication.Claims -Version 2.0.6
                    
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Nedo.AspNet.Authentication.Claims" Version="2.0.6" />
                    
For projects that support PackageReference, copy this XML node into the project file to reference the package.
<PackageVersion Include="Nedo.AspNet.Authentication.Claims" Version="2.0.6" />
                    
Directory.Packages.props
<PackageReference Include="Nedo.AspNet.Authentication.Claims" />
                    
Project file
For projects that support Central Package Management (CPM), copy this XML node into the solution Directory.Packages.props file to version the package.
paket add Nedo.AspNet.Authentication.Claims --version 2.0.6
                    
#r "nuget: Nedo.AspNet.Authentication.Claims, 2.0.6"
                    
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
#:package Nedo.AspNet.Authentication.Claims@2.0.6
                    
#:package directive can be used in C# file-based apps starting in .NET 10 preview 4. Copy this into a .cs file before any lines of code to reference the package.
#addin nuget:?package=Nedo.AspNet.Authentication.Claims&version=2.0.6
                    
Install as a Cake Addin
#tool nuget:?package=Nedo.AspNet.Authentication.Claims&version=2.0.6
                    
Install as a Cake Tool

Nedo.AspNet.Authentication.Claims

Claims transformation pipeline for the Nedo auth platform. Takes the raw claims an upstream IdP issued (Keycloak's realm_access.roles, Entra ID's groups / roles, Auth0's namespace-prefixed claims, Okta's groups, etc.) and normalizes them to the standard ClaimTypes.Role + cross-cutting concerns (tenant id, permissions, feature flags) so downstream [Authorize(Roles = "...")] and policy checks just work, regardless of which IdP minted the JWT.

Install

dotnet add package Nedo.AspNet.Authentication.Claims

This package is a transitive dependency of the four enterprise OIDC providers (Keycloak, EntraId, Auth0, Okta), so you usually don't install it directly — it comes along when you reference one of them.

Quickstart — register custom transformers

using Nedo.AspNet.Authentication.Claims;

public class TenantClaimsTransformer : INedoClaimsTransformer
{
    public Task<IEnumerable<Claim>> TransformAsync(ClaimsTransformationContext context, CancellationToken ct)
    {
        // Pull tenant from the upstream JWT's "tid" claim and re-emit as "tenant".
        var tid = context.Principal.FindFirst("tid")?.Value;
        return Task.FromResult<IEnumerable<Claim>>(
            tid is null ? Array.Empty<Claim>() : new[] { new Claim("tenant", tid) });
    }
}

builder.Services.AddNedoClaimsTransformer<TenantClaimsTransformer>();

Multiple transformers chain in DI order; their claims concatenate.

What's in here

Type Purpose
INedoClaimsTransformer Pluggable transformation step.
ClaimsTransformationContext Per-call context (ClaimsPrincipal Principal, string Provider).
Provider-specific defaults Built-in transformers shipped by each enterprise OIDC package map their idiomatic shape (Keycloak realm_access.rolesrole, Entra groupsrole, Auth0 namespace-prefixed claims, Okta groupsrole).

Docs

docs/05-claims-transformation.md — full guide including provider-specific defaults + custom-transformer recipes.

Package What it normalizes
Nedo.AspNet.Authentication.Keycloak realm_access.roles, resource_access.<client>.rolesrole
Nedo.AspNet.Authentication.EntraId App roles + groupsrole
Nedo.AspNet.Authentication.Auth0 Namespace-prefixed claims, RBAC permissions
Nedo.AspNet.Authentication.Okta groupsrole

For per-mint claim addition (roles + tenant + user-types injected at JWT issue time on Local sign-ins), see IAccessTokenClaimsEnricher in Nedo.AspNet.Authentication.Local.

License

MIT — see LICENSE.

Product Compatible and additional computed target framework versions.
.NET net9.0 is compatible.  net9.0-android was computed.  net9.0-browser was computed.  net9.0-ios was computed.  net9.0-maccatalyst was computed.  net9.0-macos was computed.  net9.0-tvos was computed.  net9.0-windows was computed.  net10.0 was computed.  net10.0-android was computed.  net10.0-browser was computed.  net10.0-ios was computed.  net10.0-maccatalyst was computed.  net10.0-macos was computed.  net10.0-tvos was computed.  net10.0-windows was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (5)

Showing the top 5 NuGet packages that depend on Nedo.AspNet.Authentication.Claims:

Package Downloads
Nedo.AspNet.Authentication.Local

Local username/password authentication for Nedo.AspNet.Authentication with EF Core persistence.

Nedo.AspNet.Authentication.Auth0

Auth0 authentication provider for Nedo.AspNet.Authentication.

Nedo.AspNet.Authentication.Keycloak

Keycloak OIDC authentication provider for Nedo.AspNet.Authentication.

Nedo.AspNet.Authentication.EntraId

Microsoft Entra ID (Azure AD) authentication provider for Nedo.AspNet.Authentication.

Nedo.AspNet.Authentication.Okta

Okta authentication provider for Nedo.AspNet.Authentication.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last Updated
2.0.9 292 5/11/2026
2.0.8 270 5/6/2026
2.0.7 268 5/5/2026
2.0.6 273 5/5/2026
2.0.4 272 5/4/2026
2.0.3 281 5/4/2026
2.0.2 273 5/2/2026
2.0.1 267 5/2/2026
2.0.0 253 5/1/2026