services | platforms | author |
---|---|---|
active-directory |
dotnet |
dstrockis |
This sample shows how to build a multi-tenant .Net MVC web application that uses OpenID Connect to sign up and sign in users from any Azure Active Directory tenant, using the ASP.Net OpenID Connect OWIN middleware and the Active Directory Authentication Library (ADAL) for .NET.
Looking for previous versions of this code sample? Check out the tags on the releases GitHub page.
For more information about how the protocols work in this scenario and other scenarios, see the Authentication Scenarios for Azure AD document.
[!Note] If you want to run this sample on Azure Government, navigate to the "Azure Government Deviations" section at the bottom of this page.
Getting started is simple! To run this sample you will need:
- Visual Studio 2013
- An Internet connection
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, please see How to get an Azure AD tenant
- A user account in your Azure AD tenant. This sample will not work with a Microsoft account, so if you signed in to the Azure portal with a Microsoft account and have never created a user account in your directory before, you need to do that now.
From your shell or command line:
git clone https://github.com/Azure-Samples/active-directory-dotnet-webapp-multitenant-openidconnect.git
- Sign in to the Azure portal.
- On the top bar, click on your account and under the Directory list, choose the Active Directory tenant where you wish to register your application.
- Click on More Services in the left hand nav, and choose Azure Active Directory.
- Click on App registrations and choose Add.
- Enter a friendly name for the application, for example 'TodoListWebApp_MT' and select 'Web Application and/or Web API' as the Application Type. For the sign-on URL, enter the base URL for the sample, which is by default
https://localhost:44302/
. Click on Create to create the application. - While still in the Azure portal, choose your application, click on Settings and choose Properties.
- Find the Application ID value and copy it to the clipboard.
- In the same page, change the "Logout Url" to
https://localhost:44302/Account/EndSession
. This is the default single sign out URL for this sample. - Find "multi-tenanted" switch and flip it to yes.
- For the App ID URI, enter
https://<your_tenant_domain>/TodoListWebApp_MT
, replacing<your_tenant_domain>
with the domain of your Azure AD tenant (either in the form<tenant_name>.onmicrosoft.com
or your own custom domain if you registered it in Azure Active Directory). - Configure Permissions for your application - in the Settings menu, choose the 'Required permissions' section, click on Add, then Select an API, and select 'Microsoft Graph' (this is the Graph API). Then, click on Select Permissions and select 'Sign in and read user profile'.
Don't close the browser yet, as we will still need to work with the portal for few more steps.
The new customer onboarding process implemented by the sample requires the application to perform an OAuth2 request, which in turn requires to associate a key to the app in your tenant.
From the Settings menu, choose Keys and add a key - select a key duration of either 1 year or 2 years. When you save this page, the key value will be displayed, copy and save the value in a safe location - you will need this key later to configure the project in Visual Studio - this key value will not be displayed again, nor retrievable by any other means, so please record it as soon as it is visible from the Azure Portal.
After provisioning the key, navigate to the "Reply URLs" section and add these two reply URLs:
-"https://localhost:44302/"
-"https://localhost:44302/Onboarding/ProcessCode"
Leave the browser open to this page.
At this point we are ready to paste into the VS project the settings that will tie it to its entry in your Azure AD tenant.
- Open the solution in Visual Studio 2017.
- Open the
web.config
file. - Find the app key
ida:Password
and replace the value you copied in step 4. - Go back to the portal, find the APPLICATION ID field and copy its content to the clipboard
- Find the app key
ida:ClientId
and replace the value with the APPLICATION ID from the Azure portal. - Navigate to the
Dal
folder and open theToDoListWebAppContext
file. In theTodoListWebAppContext()
definition set the base to the connection string for the SQL database that you want to use. If you want to use your local SQL database, your base definition should look like this:base("Server = (localdb)\\mssqllocaldb; Database=Inventory;Trusted_Connection=True;MultipleActiveResultSets=true")
.
This sample shows how to take advantage of the consent model in Azure AD to make an application available to any user from any organization with a tenant in Azure AD. To see that part of the sample in action, you need to have access to user accounts from a tenant that is different from the one you used for developing the application. The simplest way of doing that is to create a new directory tenant in your Azure subscription (just navigate to the main Active Directory page in the portal and click Add) and add test users. This step is optional as you can also use accounts from the same directory, but if you do you will not see the consent prompts as the app is already approved.
The sample implements two distinct tasks: the onboarding of a new customer and regular sign in & use of the application.
Start the application. Click on Sign Up. You will be presented with a form that simulates an onboarding process. Here you can choose if you want to follow the "admin consent" flow (the app gets provisioned for all the users in one organization - requires you to sign up using an administrator) or the "user consent" flow (the app gets provisioned for your user only). Click the SignUp button. You'll be transferred to the Azure AD portal. Sign in as the user you want to use for consenting. If the user is from a tenant that is different from the one where the app was developed, you will be presented with a consent page. Click OK. You will be transported back to the app, where your registration will be finalized.
Once you signed up, you can either click on the Todo tab or the sign in link to gain access to the application. Note that if you are doing this in the same session in which you signed up, you will automatically sign in with the same account you used for signing up. If you are signing in during a new session, you will be presented with Azure AD's credentials prompt: sign in using an account compatible with the sign up option you chose earlier (the exact same account if you used user consent, any user form the same tenant if you used admin consent).
Coming soon.
In order to run this sample on Azure Government you can follow through the steps above with a few variations:
- Step 2:
- You must register this sample for your AAD Tenant in Azure Government by following Step 2 above in the Azure Government portal.
- Step 4:
- Before configuring the sample, you must make sure your Visual Studio is connected to Azure Government.
- Navigate to the
OnboardingController.cs
file. In theauthorizationRequest
method replace "https://login.microsoftonline.com/" with "https://login.microsoftonline.us/". Make the same edit in theAuthenticationContext
definition. - Navigate to the
App_Start
folder and open theStartup.Auth.cs
file. Replace theAuthority
value with "https://login.microsoftonline.us/common/".
Once those changes have been accounted for, you should be able to run this sample on Azure Government.
The application is subdivided in three main functional areas:
- Common assets
- Sign up
- Todo editor
Let's briefly list the noteworthy elements in each area. For mroe details please refer to the comments in the code.
The application relies on models defined in Models/AppModels.cs, stored via entities as described by the context and initializer classes in the DAL folder. The Home controller provides the basis for the main experience, listing all the actions the user can perform and providing conditional UI elements for explicit sign in and sign out (driven by the Account controller).
The sign up operations are handled by the Onboarding controller. The SignUp action and corresponding view simulate a simple onboarding experience, which results in an OAuth2 code grant request that triggers the consent flow. The ProcessCode action receives authorization codes from Azure AD and, if they appear valid (see the code comments for details) it creates entries in the application store for the new customer organization/user.
This is the application proper. Its core resource is the Todo controller, a CRUD editor which leverages claims and the entity framework to manage a personalized list of Todo items for the currently signed in user. The Todo controller is secured via OpenId Connect, according to the logic in App_Start/Startup.Auth.cs. Notable code:
TokenValidationParameters = new System.IdentityModel.Tokens.TokenValidationParameters
{
ValidateIssuer = false,
}
That code turns off the default Issuer validation, given that in the multitenant case the list of acceptable issuer values is dynamic and cannot be acquired via metadata (as it is instead the case for the single organization case).
RedirectToIdentityProvider = (context) =>
{
string appBaseUrl = context.Request.Scheme + "://" + context.Request.Host + context.Request.PathBase;
context.ProtocolMessage.Redirect_Uri = appBaseUrl;
context.ProtocolMessage.Post_Logout_Redirect_Uri = appBaseUrl;
return Task.FromResult(0);
}
That handler for RedirectToIdentityProvider
assigns to the Redirect_Uri
and Post_Logout_Redirect_Uri
(properties used for sign in and sign out locations) URLs that reflect the current address of the application. This allows you to deploy the app to Azure Web Sites or any other location without having to change hardcoded address settings. Note that you do need to add the intended addresses to the Azure AD entry for your application.
Finally: the implementation of SecurityTokenValidated
contains the custom caller validation logic, comparing the incoming token with the database of trusted tenants and registered users and interrupting the authentication sequence if a match is not found.
All of the OWIN middleware in this project is created as a part of the open source Katana project. You can read more about OWIN here.