OWIN Security Authentication

This section is applicable if your application uses OWIN and classic .NET Framework. For ASP.NET Core stack, visit the Using Microsoft ASP.NET Core Authentication.

Let's see how to use the OWIN Security framework. To set up the standard cookie authentication, just add this snippet in the Startup.cs file.

app.UseCookieAuthentication(new CookieAuthenticationOptions()
{
    AuthenticationType = DefaultAuthenticationTypes.ApplicationCookie,
    LoginPath = new PathString("/login"),       // don't use ~/login here - the ~ in URLs is a DotVVM feature, OWIN security doesn't know it
    Provider = new CookieAuthenticationProvider()
    {
        OnApplyRedirect = e => DotvvmAuthenticationHelper.ApplyRedirectResponse(e.OwinContext, e.RedirectUri)
    }
});

Please note that authentication middlewares should be always registered before DotVVM. The authentication middleware needs to determine the current user (e.g. by parsing the authentication token from the cookie) before DotVVM takes control of the HTTP request.

The DotvvmAuthenticationHelper.ApplyRedirectResponse method is used to perform the redirect because DotVVM uses a different way to handle redirects. Because the HTTP requests invoked by the command bindings are done using AJAX, DotVVM cannot return the HTTP 302 code. Instead, it returns HTTP 200 with a JSON object which instructs DotVVM to load the new URL.

Login Page with OWIN Cookie Authentication

In the login page, you need to verify the user credentials and create the ClaimsIdentity object that represents the logged user's identity. Then, you need to pass the identity to the GetAuthentication().SignIn method:

public class LoginViewModel : DotvvmViewModelBase
{
    public string UserName { get; set; }
    public string Password { get; set; }        

    public void Login() 
    {
        if (VerifyCredentials(UserName, Password)) 
        {
            // the CreateIdentity is your own method which creates the IIdentity representing the user
            var identity = CreateIdentity(UserName);
            Context.GetAuthentication().SignIn(identity);
            Context.RedirectToUrl("/signedIn");
        }
    }

    private bool VerifyCredentials(string username, string password) 
    {
        // verify credentials and return true or false
    }

    private ClaimsIdentity CreateIdentity(string username) 
    {
        var identity = new ClaimsIdentity(
            new[]
            {
                new Claim(ClaimTypes.Name, username),

                // add claims for each user role
                new Claim(ClaimTypes.Role, "administrator"),
            },
            DefaultAuthenticationTypes.ApplicationCookie);
        return identity;
    }
}

Using Social Providers

If you want to let the users to sign in using Facebook or other third party identity provider, you need to do several things.

First, you need to install the appropriate NuGet package - Microsoft.Owin.Security.Facebook.

In order to redirect to the Facebook login page, you can use this code:

public void LoginWithFacebook()
{
    var properties = new AuthenticationProperties()
    {
        RedirectUri = "http://myapp.com/Register"
    };
    Context.GetAuthentication().Challenge(properties, "Facebook");
    Context.InterruptRequest();
}

Please note that after the Authentication.Challenge call which sets the HTTP code to 403, we need to call Context.InterruptRequest(). This will tell DotVVM to stop executing this request and not to manipulate with the HTTP response.

To configure the Facebook Authentication, use the following code in the Startup.cs:

app.UseFacebookAuthentication(new FacebookAuthenticationOptions()
{
    ...
    Provider = new FacebookAuthenticationProvider()
    {
        OnApplyRedirect = context => DotvvmAuthenticationHelper.ApplyRedirectResponse(context.OwinContext, context.RedirectUri),
        ...
    }
});

Using Azure Active Directory

In order to use Azure Active Directory as the identity provider, you can use the Open ID Connect middleware using the Microsoft.Owin.Security.OpenIdConnect package.

For the details, visit the DotVVM with Azure AD Authentication Sample.

On this page