Conditionally handling denied access behavior in ASP.NET Core





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}







1















I'm trying to create an ASP.Net Core app which contains both MVC and API controllers in single project. For authenticating I use IdentityServer4.



Currently when the user is not authorized for a request he is always redirected to Account/AccessDenied path regardless of authentication scheme. But I want to keep this behavior only for MVC controllers. For API requests I just want to return 403 status code.



Configuration:



services
.AddIdentityServer()
.AddDeveloperSigningCredential()
.AddInMemoryApiResources(ApiResourceProvider.GetAllResources())
.AddAspNetIdentity<ApplicationUser>()
.AddInMemoryClients(clientStore.AllClients);

services
.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
.AddJwtBearer(options =>
{
options.RequireHttpsMetadata = true;
options.TokenValidationParameters = new TokenValidationParameters
{
ValidateIssuer = true,
ValidIssuer = tokenAuth.Issuer,
ValidateAudience = true,
ValidAudience = tokenAuth.Audience,
ValidateLifetime = true,
IssuerSigningKey = tokenAuth.SecurityKey,
ValidateIssuerSigningKey = true
};
});


How can I achieve that?










share|improve this question































    1















    I'm trying to create an ASP.Net Core app which contains both MVC and API controllers in single project. For authenticating I use IdentityServer4.



    Currently when the user is not authorized for a request he is always redirected to Account/AccessDenied path regardless of authentication scheme. But I want to keep this behavior only for MVC controllers. For API requests I just want to return 403 status code.



    Configuration:



    services
    .AddIdentityServer()
    .AddDeveloperSigningCredential()
    .AddInMemoryApiResources(ApiResourceProvider.GetAllResources())
    .AddAspNetIdentity<ApplicationUser>()
    .AddInMemoryClients(clientStore.AllClients);

    services
    .AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
    .AddJwtBearer(options =>
    {
    options.RequireHttpsMetadata = true;
    options.TokenValidationParameters = new TokenValidationParameters
    {
    ValidateIssuer = true,
    ValidIssuer = tokenAuth.Issuer,
    ValidateAudience = true,
    ValidAudience = tokenAuth.Audience,
    ValidateLifetime = true,
    IssuerSigningKey = tokenAuth.SecurityKey,
    ValidateIssuerSigningKey = true
    };
    });


    How can I achieve that?










    share|improve this question



























      1












      1








      1








      I'm trying to create an ASP.Net Core app which contains both MVC and API controllers in single project. For authenticating I use IdentityServer4.



      Currently when the user is not authorized for a request he is always redirected to Account/AccessDenied path regardless of authentication scheme. But I want to keep this behavior only for MVC controllers. For API requests I just want to return 403 status code.



      Configuration:



      services
      .AddIdentityServer()
      .AddDeveloperSigningCredential()
      .AddInMemoryApiResources(ApiResourceProvider.GetAllResources())
      .AddAspNetIdentity<ApplicationUser>()
      .AddInMemoryClients(clientStore.AllClients);

      services
      .AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
      .AddJwtBearer(options =>
      {
      options.RequireHttpsMetadata = true;
      options.TokenValidationParameters = new TokenValidationParameters
      {
      ValidateIssuer = true,
      ValidIssuer = tokenAuth.Issuer,
      ValidateAudience = true,
      ValidAudience = tokenAuth.Audience,
      ValidateLifetime = true,
      IssuerSigningKey = tokenAuth.SecurityKey,
      ValidateIssuerSigningKey = true
      };
      });


      How can I achieve that?










      share|improve this question
















      I'm trying to create an ASP.Net Core app which contains both MVC and API controllers in single project. For authenticating I use IdentityServer4.



      Currently when the user is not authorized for a request he is always redirected to Account/AccessDenied path regardless of authentication scheme. But I want to keep this behavior only for MVC controllers. For API requests I just want to return 403 status code.



      Configuration:



      services
      .AddIdentityServer()
      .AddDeveloperSigningCredential()
      .AddInMemoryApiResources(ApiResourceProvider.GetAllResources())
      .AddAspNetIdentity<ApplicationUser>()
      .AddInMemoryClients(clientStore.AllClients);

      services
      .AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
      .AddJwtBearer(options =>
      {
      options.RequireHttpsMetadata = true;
      options.TokenValidationParameters = new TokenValidationParameters
      {
      ValidateIssuer = true,
      ValidIssuer = tokenAuth.Issuer,
      ValidateAudience = true,
      ValidAudience = tokenAuth.Audience,
      ValidateLifetime = true,
      IssuerSigningKey = tokenAuth.SecurityKey,
      ValidateIssuerSigningKey = true
      };
      });


      How can I achieve that?







      asp.net-core-mvc identityserver4 asp.net-core-webapi asp.net-authorization






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Jan 3 at 9:37









      Peter B

      13.7k52046




      13.7k52046










      asked Jan 3 at 9:22









      Roman KoliadaRoman Koliada

      1,705829




      1,705829
























          2 Answers
          2






          active

          oldest

          votes


















          1














          If you're using cookies you can override the AccessDeniedPath like the following



          services.AddAuthentication(options =>
          {
          options.DefaultScheme = "Cookies";
          options.DefaultChallengeScheme = "oidc";
          }).AddCookie("Cookies", (options) =>
          {
          options.AccessDeniedPath = "/Authorization/AccessDenied";
          })





          share|improve this answer































            0














            Actually it was quite simple but not obvious: it's needed to explicitly specify authentication scheme in [Authorize] attribute.



            I tried to specify [Authorize(AuthenticationSchemes = JwtBearerDefaults.AuthenticationScheme)] on a controller level but it seems that setting [Authorize(Roles = RoleHelper.MobileWorker)] on the action level overrides the auth schema.
            So I created a custom attribute which is derived from Authorize but with properly set auth scheme.






            share|improve this answer
























              Your Answer






              StackExchange.ifUsing("editor", function () {
              StackExchange.using("externalEditor", function () {
              StackExchange.using("snippets", function () {
              StackExchange.snippets.init();
              });
              });
              }, "code-snippets");

              StackExchange.ready(function() {
              var channelOptions = {
              tags: "".split(" "),
              id: "1"
              };
              initTagRenderer("".split(" "), "".split(" "), channelOptions);

              StackExchange.using("externalEditor", function() {
              // Have to fire editor after snippets, if snippets enabled
              if (StackExchange.settings.snippets.snippetsEnabled) {
              StackExchange.using("snippets", function() {
              createEditor();
              });
              }
              else {
              createEditor();
              }
              });

              function createEditor() {
              StackExchange.prepareEditor({
              heartbeatType: 'answer',
              autoActivateHeartbeat: false,
              convertImagesToLinks: true,
              noModals: true,
              showLowRepImageUploadWarning: true,
              reputationToPostImages: 10,
              bindNavPrevention: true,
              postfix: "",
              imageUploader: {
              brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
              contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
              allowUrls: true
              },
              onDemand: true,
              discardSelector: ".discard-answer"
              ,immediatelyShowMarkdownHelp:true
              });


              }
              });














              draft saved

              draft discarded


















              StackExchange.ready(
              function () {
              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f54019390%2fconditionally-handling-denied-access-behavior-in-asp-net-core%23new-answer', 'question_page');
              }
              );

              Post as a guest















              Required, but never shown

























              2 Answers
              2






              active

              oldest

              votes








              2 Answers
              2






              active

              oldest

              votes









              active

              oldest

              votes






              active

              oldest

              votes









              1














              If you're using cookies you can override the AccessDeniedPath like the following



              services.AddAuthentication(options =>
              {
              options.DefaultScheme = "Cookies";
              options.DefaultChallengeScheme = "oidc";
              }).AddCookie("Cookies", (options) =>
              {
              options.AccessDeniedPath = "/Authorization/AccessDenied";
              })





              share|improve this answer




























                1














                If you're using cookies you can override the AccessDeniedPath like the following



                services.AddAuthentication(options =>
                {
                options.DefaultScheme = "Cookies";
                options.DefaultChallengeScheme = "oidc";
                }).AddCookie("Cookies", (options) =>
                {
                options.AccessDeniedPath = "/Authorization/AccessDenied";
                })





                share|improve this answer


























                  1












                  1








                  1







                  If you're using cookies you can override the AccessDeniedPath like the following



                  services.AddAuthentication(options =>
                  {
                  options.DefaultScheme = "Cookies";
                  options.DefaultChallengeScheme = "oidc";
                  }).AddCookie("Cookies", (options) =>
                  {
                  options.AccessDeniedPath = "/Authorization/AccessDenied";
                  })





                  share|improve this answer













                  If you're using cookies you can override the AccessDeniedPath like the following



                  services.AddAuthentication(options =>
                  {
                  options.DefaultScheme = "Cookies";
                  options.DefaultChallengeScheme = "oidc";
                  }).AddCookie("Cookies", (options) =>
                  {
                  options.AccessDeniedPath = "/Authorization/AccessDenied";
                  })






                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Jan 3 at 10:04









                  RavRav

                  20328




                  20328

























                      0














                      Actually it was quite simple but not obvious: it's needed to explicitly specify authentication scheme in [Authorize] attribute.



                      I tried to specify [Authorize(AuthenticationSchemes = JwtBearerDefaults.AuthenticationScheme)] on a controller level but it seems that setting [Authorize(Roles = RoleHelper.MobileWorker)] on the action level overrides the auth schema.
                      So I created a custom attribute which is derived from Authorize but with properly set auth scheme.






                      share|improve this answer




























                        0














                        Actually it was quite simple but not obvious: it's needed to explicitly specify authentication scheme in [Authorize] attribute.



                        I tried to specify [Authorize(AuthenticationSchemes = JwtBearerDefaults.AuthenticationScheme)] on a controller level but it seems that setting [Authorize(Roles = RoleHelper.MobileWorker)] on the action level overrides the auth schema.
                        So I created a custom attribute which is derived from Authorize but with properly set auth scheme.






                        share|improve this answer


























                          0












                          0








                          0







                          Actually it was quite simple but not obvious: it's needed to explicitly specify authentication scheme in [Authorize] attribute.



                          I tried to specify [Authorize(AuthenticationSchemes = JwtBearerDefaults.AuthenticationScheme)] on a controller level but it seems that setting [Authorize(Roles = RoleHelper.MobileWorker)] on the action level overrides the auth schema.
                          So I created a custom attribute which is derived from Authorize but with properly set auth scheme.






                          share|improve this answer













                          Actually it was quite simple but not obvious: it's needed to explicitly specify authentication scheme in [Authorize] attribute.



                          I tried to specify [Authorize(AuthenticationSchemes = JwtBearerDefaults.AuthenticationScheme)] on a controller level but it seems that setting [Authorize(Roles = RoleHelper.MobileWorker)] on the action level overrides the auth schema.
                          So I created a custom attribute which is derived from Authorize but with properly set auth scheme.







                          share|improve this answer












                          share|improve this answer



                          share|improve this answer










                          answered Jan 3 at 10:12









                          Roman KoliadaRoman Koliada

                          1,705829




                          1,705829






























                              draft saved

                              draft discarded




















































                              Thanks for contributing an answer to Stack Overflow!


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid



                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.


                              To learn more, see our tips on writing great answers.




                              draft saved


                              draft discarded














                              StackExchange.ready(
                              function () {
                              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f54019390%2fconditionally-handling-denied-access-behavior-in-asp-net-core%23new-answer', 'question_page');
                              }
                              );

                              Post as a guest















                              Required, but never shown





















































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown

































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown







                              Popular posts from this blog

                              MongoDB - Not Authorized To Execute Command

                              How to fix TextFormField cause rebuild widget in Flutter

                              in spring boot 2.1 many test slices are not allowed anymore due to multiple @BootstrapWith