Use CAS protocol beside Asp identity cookie authentication in MVC web apps - asp.net

I have implemented a login system in my MVC web application using ASP Identity framework with owin. In addition to that, I need to integrate Central Authentication Service (CAS) into my login system as an external login mechanism.
All tutorials I found was only using CAS. Is there any way I could accomplish that?

Related

How to login to WebApi from Blazor server side and retrieve and pass the cookie to the app?

I want to build a Blazor Server Side app that calls an ASP NET Core Web API that requires authentication/authorization using the Microsoft AspNetCore Identity. I have gonne so far to login, but couldn't find a way to send the cookie after login and delete it on logout.
I have searched extensively, but only found for OAuth, OpenID, Azure, AD, IdentityServer4, ClientSide etc...
As far as I know, the asp.net core identity contains the login view and login action method, there is no build-in that support web api. If you want to use web api with identity, you should inject the user manager and build the authentication controller by yourself.
More details, I suggest you could refer to this article.
Besides for client side part, I suggest you could try to refer to this blog to know how to authentication with client-side Blazor using WebAPI.
This article provide a complete example to authentication with client-side Blazor using WebAPI and ASP.NET Core Identity and configuring Role-based Authorization with client-side Blazor.
It also contains the github for this example.

Integrating IdentityServer3 OpenID Connect Provider and OAuth 2.0 Authorization Server with a web forms asp.net 4.6 application

How can I integrate IdentityServer3 (OpenID Connect Provider and OAuth 2.0 Authorization Server Framework)
that is based on OWIN middleware with a web forms asp.net 4.6 application like DNN CMS with its own membership provider.
I would like to provide Custom Store implementation for IdentityServer3 to manager/pick DNN's users, roles, claims.
Essentially I would like to know how can an OWIN based application interact (share some of the run time data (context) with a Web Forms Asp.net application.
Are we dealing with completely isolated pipelines here if I install Identity Server under the same web application?
DotNetNuke uses a membership provider which is heavily based on the asp.net equivalent, but extends and alters it to support some additional functionality and be aware of DotNetNuke concepts such as portal isolation.You can read about the enhancements made from the asp.net provider here.
DNN would need to support external authentications from an OIDC IdP.

Single signon and ADFS3.0

I have been tasked to set up Single Signon for asp.net application (SAAS) using IIS server with a client who has ADFS3.0 for providing identity credentials. the users authenticated will be allowed to log in to the web application but i have been going through a lot of information as how to set up service provider files as the application is already running.
what settings and where do i need to configure them. any help will be greatly appreciated.
The "modern" way to do this is by using OWIN.
You will have to change your application as per Use the OWIN Security Components in ASP.NET to Implement Web Sign On with ADFS.
Then add your RP to ADFS and you are good to go.
For completeness. the "old" way to do this is to use WIF as in How To: Build Claims-Aware ASP.NET MVC Web Application Using WIF.

WPF login to ASP.NET MVC5

I'm currently working with a asp.net MVC5 project. But I had a fun Idea I would made a WPF application aswell. And with this WPF application I would like to login with the login info I have on my asp.net site. I do know how to link the database to my WPF application how ever, after doing this I am stuck and I would appricate some help.
This is already provided by the ASP.NET Client Application Services, which expose ASP.NET services like membership, profile etc as services to other applications. Authentication is specifically addressed in How to: Implement User Login with Client Application Services with a full walkthrough in Walkthrough: Using Client Application Services.
A far better solution though would be to use Windows Authentication, if the WPF client and IIS servers are in the same domain. This way you wouldn't need to do anything on the client side, and only have to enable Windows Authentication on the server side.

Authentication and authorization - new to security

Need to develop a Web application that will be used to authenticate and authorize internal and external users to log and then re-route to web applications for the organization. The login application should be able to provider smooth integration with any future applications that needs a secured authentication.
Should I be using WIF - Claims based Identity/ADFS or asp.net Role membership provider to develop this app.? Or is there any other approach which will help achieve this?
I've been working on an asp.net site with WIF for several months now. I like that WIF is very flexible, but the documentation is poor. Check out the discussions on SO about WIF.

Resources