[英]How can you use Auth0 with existing ASP.NET Core Identity database?
我正在为应用程序进行Auth0集成。 我有一个现有应用程序,该应用程序使用ASP.NET Core身份标识和一个SQL数据库,当前带有常规表(AspNetUsers,AspNetRoles等)。
问题在于Auth0当前具有用于与ASP.NET成员资格提供程序( MVC3通用提供程序和MVC4简单成员资格 )数据库一起使用的自定义数据库模板,但没有与ASP.NET Core身份一起使用。 由于我不完全知道如何编码与我的ASP.NET Core Identity数据库兼容所必需的密码哈希,因此这是一个大问题。
有没有人有使用现有ASP.NET Core Identity数据库的Auth0自定义数据库脚本的示例? 或者,至少是我自己用来编码的哈希算法?
有关更多信息, ASP.NET Core Identity数据库具有一个AspNetUsers
表,该表包含以下与该集成有关的列:
Id
(PK,nvarchar,不为null) Email
(nvarchar,空) PasswordHash
(nvarchar,空) SecurityStamp
(nvarchar,空) UserName
(nvarchar,不为null) 为了清楚起见,我想问的是如何在用JavaScript编写的Auth0配置中设置自定义数据库脚本; 而不是ASP.NET Web应用程序代码。 根据文档,Web应用程序非常简单,可以进行设置。 仅仅是Auth0内置的自定义数据库模板,不包括用于ASP.NET Core Identity数据库架构和密码哈希的示例。
任何帮助将不胜感激!
您还需要弄清楚使用的哈希算法,并使用Auth0文档修改模板中包含的脚本,以使其正确。 您可以在aspnet-identity-pw项目中找到该算法的代码。
这是Auth0的示例登录数据库操作脚本,该脚本可与Azure SQL数据库中存储的ASP.NET Core Identity 2.0数据库一起使用:
function login (username, password, callback) {
var Connection = require('tedious@1.11.0').Connection;
var Request = require('tedious@1.11.0').Request;
var TYPES = require('tedious@1.11.0').TYPES;
var connection = new Connection({
userName: configuration.db_username + '@' + configuration.db_server,
password: configuration.db_password,
server: configuration.db_server, //'dbserver.database.windows.net',
options: {
database: configuration.db_database,
encrypt: true
}
});
connection.on('debug', function(text) {
// if you have connection issues, uncomment this to get more detailed info
//console.log(text);
}).on('errorMessage', function(text) {
// this will show any errors when connecting to the SQL database or with the SQL statements
//console.log(JSON.stringify(text));
});
connection.on('connect', function (err) {
if (err) {
console.log('error: ' + JSON.stringify(err));
return callback(err);
}
getMembershipUser(username, function(err, user) {
if (err) {
return callback(err); // this will return a 500
}
if (!user.profile) {
return callback(); // this will return a 401
}
validatePassword(password, user.password.hash, function(err, isValid) {
if (!isValid) {
return callback(); // unauthorized
}
callback(null, user.profile);
});
});
});
// Membership Provider implementation used with ASP.NET Core Identity database
/**
* getMembershipUser
*
* This function gets a username or email and returns a user info, password hashes and salt
*
* @usernameOrEamil {[string]} the username or email, the method will do a query
* on both with an OR
* @callback {[Function]} first argument will be the Error if any, and second
* argument will be a user object
*/
function getMembershipUser(usernameOrEmail, callback) {
var user = {};
var query =
'SELECT Id, UserName, Email, PasswordHash, SecurityStamp from AspNetUsers ' +
'WHERE UserName = @UserName';
var getMembershipQuery = new Request(query);
getMembershipQuery.addParameter('UserName', TYPES.VarChar, usernameOrEmail);
getMembershipQuery.on('row', function (fields) {
user.profile = {};
user.password = {};
for(var f in fields) {
var item = fields[f];
if (item.metadata.colName === 'Id') {
user.profile.user_id = item.value;
} else if (item.metadata.colName === 'UserName') {
user.profile.nickname = item.value;
} else if (item.metadata.colName ==='Email') {
user.profile.email = item.value;
} else if (item.metadata.colName ==='PasswordHash') {
user.password.hash = item.value;
}
}
//console.log('User: ' + JSON.stringify(user));
callback(null, user);
});
connection.execSql(getMembershipQuery);
}
/**
* validatePassword
*
* This function gets the password entered by the user, and the original password
* hash and salt from database and performs an HMAC SHA256 hash.
*
* @password {[string]} the password entered by the user
* @originalHash {[string]} the original password hashed from the database
* (including the salt).
* @return {[bool]} true if password validates
*/
function validatePassword(password, originalHash, callback) {
aspnet_identity_pw.validatePassword(password, originalHash, function(result, isValid) {
console.log('Is Password Valid: ' + isValid);
callback(null, isValid);
});
}
var aspnet_identity_pw = {
validatePassword: function(password, hashedPassword, callback) {
// Original Source:
// https://github.com/Syncbak-Git/aspnet-identity-pw/blob/master/lib/aspnet-identity-pw.js
// https://www.npmjs.com/package/aspnet-identity-pw
// There were some slight modifications to make it run well in Auth0
var done = false;
var error = null;
var result = null;
if(!hashedPassword) {
if(callback) {
callback(null, false);
}
return false;
}
if(!password) {
error = new Error("Password is required.");
if(callback) {
callback(error);
return;
}
throw error;
}
var src = new Buffer(hashedPassword, 'base64');
if(src.length !== 49 || src[0] !== 0) {
return false;
}
var salt = new Buffer(16);
src.copy(salt, 0, 1, 17);
var bytes = new Buffer(32);
src.copy(bytes, 0, 17, 49);
var hashed = crypto.pbkdf2Sync(password, salt, 1000, 32, 'sha1');
result = true;
for(var i = 0; i < 32; i++) {
if(bytes[i] !== hashed[i]) {
result = false;
break;
}
}
done = true;
if(callback) {
callback(null, result);
}
if(!callback) {
throw 'callback required!';
}
}
};
}
这花了似乎永远的时间才能完全弄清楚。 尤其是要对密码哈希算法进行编码,直到绊倒带有其代码的js项目为止。
希望这对别人有帮助!
声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.