IntelligentPlant.IndustrialAppStore.AspNetCore
3.0.0-pre.361
dotnet add package IntelligentPlant.IndustrialAppStore.AspNetCore --version 3.0.0-pre.361
NuGet\Install-Package IntelligentPlant.IndustrialAppStore.AspNetCore -Version 3.0.0-pre.361
<PackageReference Include="IntelligentPlant.IndustrialAppStore.AspNetCore" Version="3.0.0-pre.361" />
paket add IntelligentPlant.IndustrialAppStore.AspNetCore --version 3.0.0-pre.361
#r "nuget: IntelligentPlant.IndustrialAppStore.AspNetCore, 3.0.0-pre.361"
// Install IntelligentPlant.IndustrialAppStore.AspNetCore as a Cake Addin #addin nuget:?package=IntelligentPlant.IndustrialAppStore.AspNetCore&version=3.0.0-pre.361&prerelease // Install IntelligentPlant.IndustrialAppStore.AspNetCore as a Cake Tool #tool nuget:?package=IntelligentPlant.IndustrialAppStore.AspNetCore&version=3.0.0-pre.361&prerelease
IntelligentPlant.IndustrialAppStore.AspNetCore
This package provides a set of ASP.NET Core services and middleware that enable you to integrate applications with the Industrial App Store.
Please consider using the IntelligentPlant.IndustrialAppStore.Templates package to simplify creation of projects that are pre-configured to use this package.
Getting Started
Authentication and Industrial App Store Integration
First, visit the Industrial App Store and create a registration for your app. When you register your app, you can configure the default scopes (i.e. permissions) that the app will request (user info, reading user data sources, etc).
You must also register a redirect URL to use when signing users in. The default relative path used is /auth/signin-ip
i.e. if your app will run at https://localhost:44321
, you must register https://localhost:44321/auth/signin-ip
as an allowed redirect URL.
In your application's appsettings.json
file, add the following items, replacing the placeholders with values from your app registration:
{
"IAS": {
"ClientId": "<YOUR CLIENT ID>",
"ClientSecret": "<YOUR CLIENT SECRET>"
}
}
NOTE: Do not store client secrets in the
appsettings.json
file in a production environment! Services such as Azure Key Vault can be used to securely store client secrets and retrieve them at runtime.
Next, configure your application to use the Industrial App Store for authentication:
// Program.cs
var builder = WebApplication.CreateBuilder(args);
builder.Services.AddIndustrialAppStoreAuthentication(options => {
// Bind the settings from the app configuration to the Industrial App Store
// authentication options.
builder.Configuration.GetSection("IAS").Bind(options);
});
// Configure additional services etc. here.
var app = builder.Build();
app.UseRouting();
app.UseAuthentication();
app.UseAuthorization();
// Configure HTTP pipeline here.
If your app has a login page that requires the user to accept a privacy policy or explicitly enable persistent cookies, you can specify this as follows:
builder.Services.AddIndustrialAppStoreAuthentication(options => {
// Bind the settings from the app configuration to the Industrial App Store
// authentication options.
builder.Configuration.GetSection("IAS").Bind(options);
// Set the login path to be our login page.
options.LoginPath = new PathString("/Account/Login");
});
Calling Industrial App Store APIs
Inject the IndustrialAppStoreHttpClient
service into your types to obtain an API client that will authenticate as the calling user:
app.MapGet("/api/user", async (IndustrialAppStoreHttpClient client) => {
var user = await client.UserInfo.GetUserInfoAsync();
return Results.Json(user);
});
Refer to the project repository for more details on available API calls.
Custom Headers
The custom headers services and middleware allow you to define HTTP response headers via configuration that will be added to every outgoing response:
var builder = WebApplication.CreateBuilder(args);
builder.Services.AddCustomHeaders();
// ...
var app = builder.Build();
app.UseCustomHeaders();
// ...
app.Run();
You can define the custom response headers via the CustomHeaders
section of your application's appsettings.json
file. For example:
{
"CustomHeaders": {
"X-Content-Type-Options": "nosniff",
"X-Frame-Options": "deny",
"X-XSS-Protection": "1; mode=block"
}
}
Content Security Policy
A Content Security Policy gives you fine-grained control over where the browser can load content such as scripts and images from. For simple use cases, you can set a hard-coded Content-Security-Policy
response header using the custom headers middleware above. However, the library also provides dedicated middleware and services to define a CSP in a more flexible way.
First, register the required services and middlware with your application:
var builder = WebApplication.CreateBuilder(args);
// Next line is only required if you want to define your CSP in a separate configuration file.
builder.Configuration.AddJsonFile("csp.json", optional: true, reloadOnChange: true);
builder.Services.AddContentSecurityPolicy();
// ...
var app = builder.Build();
app.UseContentSecurityPolicy();
// ...
app.Run();
Next, define your CSP via the ContentSecurityPolicy
section of your application's appsettings.json
file (or in a separate configuration file if preferred). For example:
{
"ContentSecurityPolicy": {
"Policies": {
"_": {
"Priority": 100,
"Match": [ "*" ],
"Policy": {
"default-src": [
"'self'"
],
"frame-ancestors": [
"'none'"
],
"script-src": [
"'self'"
],
"style-src": [
"'self'"
],
"img-src": [
"'self'"
]
}
},
"home_controller": {
"Match": [ "/", "/Home/*" ],
"Policy": {
"script-src": [
"'unsafe-hashes'",
"'sha256-xzhLGrw7novI3sfqwa1y2oKXixPoY89o+n4dy1X+lWU='"
],
"style-src": [
"'sha256-0pgtLHffxw9208zzWrww2r1Jt4PeiShv+N72R+PmXAU='"
],
"img-src": [
"data:",
"https://appstore.intelligentplant.com"
]
}
}
}
}
}
The CSP configuration is mapped to the ContentSecurityPolicyOptions
options class at runtime. Each value in the Policies
section is mapped to a ContentSecurityPolicyDefinition
object, with the key being an identifier for the policy.
An individual policy definition can define the following properties:
Match
- An array of URL paths that the policy matches. Entries can use*
as a wildcard. If not specified, the definition will match all paths.Priority
- An integer priority for the definition. Definitions with higher priorities will be applied first. If not specified, a priority of zero will be used.Policy
- the CSP directives and values for the policy. See here for information about the available directives and values.
Multiple policies can be applied to a given path. Policies are applied from highest priority to lowest priority, and are additive by default (i.e. if both of the policies in the example above were applied to a request, the generated CSP would be the composite of both policies).
To remove a directive value added by a policy with a higher priority, prefix the value with -:
. For example:
{
"ContentSecurityPolicy": {
"Policies": {
"allow_embed": {
"Match": [ "/allow-framing/*" ],
"Policy": {
"frame-ancestors": [
"-:'none'",
"https://*.intelligentplant.com"
]
}
}
}
}
}
The CSP is enabled by default. To monitor the effects of the CSP without enforcing it, you can set it to report-only mode:
{
"ContentSecurityPolicy": {
"ReportOnly": true,
"Policies": { }
}
}
Enabling report-only mode sets the Content-Security-Policy-Report-Only
header in HTTP responses instead of the Content-Security-Policy
header. See here for further details.
Finally, it is also possible to register a callback that the CSP middleware will invoke for every request after the default CSP has been configured. This allows additional customisation on a case-by-case basis where required:
app.UseContentSecurityPolicy((HttpContext context, ContentSecurityPolicyBuilder builder) => {
// For some pages, we use images that are defined inline using data: URIs.
if (context.Request.Path.StartsWithSegments("/needs-inline-image")) {
var directive = builder.GetOrCreateDirective("image-src");
directive.Add("data:");
}
return default;
});
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net8.0 is compatible. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net8.0
- No dependencies.
NuGet packages (1)
Showing the top 1 NuGet packages that depend on IntelligentPlant.IndustrialAppStore.AspNetCore:
Package | Downloads |
---|---|
IntelligentPlant.IndustrialAppStore.Authentication
ASP.NET Core authentication handler for Intelligent Plant's Industrial App Store. |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
3.0.0-pre.361 | 32 | 11/20/2024 |
3.0.0-pre.358 | 34 | 11/20/2024 |
3.0.0-pre.351 | 36 | 11/15/2024 |
3.0.0-pre.348 | 53 | 11/11/2024 |
3.0.0-pre.339 | 38 | 11/7/2024 |
3.0.0-pre.328 | 59 | 10/31/2024 |
3.0.0-pre.320 | 37 | 10/31/2024 |
2.3.0-pre.293 | 85 | 2/6/2024 |
2.3.0-pre.280 | 108 | 3/28/2023 |
2.3.0-pre.269 | 136 | 9/9/2022 |
2.3.0-pre.259 | 116 | 6/28/2022 |
2.3.0-pre.256 | 124 | 6/27/2022 |
2.3.0-pre.236 | 122 | 3/24/2022 |
2.2.3 | 106 | 10/29/2024 |
2.2.2 | 114 | 10/10/2024 |
2.2.1 | 889 | 5/11/2022 |
2.2.0 | 767 | 3/10/2022 |
2.1.0 | 785 | 2/23/2022 |
2.1.0-alpha.220 | 133 | 2/23/2022 |
2.1.0-alpha.216 | 120 | 2/23/2022 |
2.1.0-alpha.213 | 118 | 2/22/2022 |
2.1.0-alpha.210 | 121 | 2/22/2022 |
2.1.0-alpha.207 | 124 | 2/22/2022 |