Keycloak.AuthServices.Sdk
2.0.0-pre-1
Prefix Reserved
See the version list below for details.
dotnet add package Keycloak.AuthServices.Sdk --version 2.0.0-pre-1
NuGet\Install-Package Keycloak.AuthServices.Sdk -Version 2.0.0-pre-1
<PackageReference Include="Keycloak.AuthServices.Sdk" Version="2.0.0-pre-1" />
paket add Keycloak.AuthServices.Sdk --version 2.0.0-pre-1
#r "nuget: Keycloak.AuthServices.Sdk, 2.0.0-pre-1"
// Install Keycloak.AuthServices.Sdk as a Cake Addin #addin nuget:?package=Keycloak.AuthServices.Sdk&version=2.0.0-pre-1&prerelease // Install Keycloak.AuthServices.Sdk as a Cake Tool #tool nuget:?package=Keycloak.AuthServices.Sdk&version=2.0.0-pre-1&prerelease
Keycloak.AuthServices
Easy Authentication and Authorization with Keycloak in .NET and ASP.NET Core.
Getting Started
// Program.cs
var builder = WebApplication.CreateBuilder(args);
var host = builder.Host;
var configuration = builder.Configuration;
var services = builder.Services;
services.AddKeycloakAuthentication(configuration);
var app = builder.Build();
app.UseAuthentication();
app.UseAuthorization();
app.MapGet("/", () => "Hello World!");
app.Run();
In this example, configuration is based on appsettings.json
.
//appsettings.json
{
"Keycloak": {
"realm": "Test",
"auth-server-url": "http://localhost:8080/",
"ssl-required": "none",
"resource": "test-client",
"verify-token-audience": false,
"credentials": {
"secret": ""
},
"confidential-port": 0
}
}
It's fetched based on well-known section "Keycloak". AddKeycloakAuthentication
uses KeycloakAuthenticationOptions.Section
under the hood.
You can always fetch the corresponding authentication options like this:
var authenticationOptions = configuration
.GetSection(KeycloakAuthenticationOptions.Section)
.Get<KeycloakAuthenticationOptions>(KeycloakInstallationOptions.KeycloakFormatBinder);
services.AddKeycloakAuthentication(authenticationOptions);
AddKeycloakAuthentication
method has several overloads. It allows to override some conventions, for example:
public static AuthenticationBuilder AddKeycloakAuthentication(
this IServiceCollection services,
IConfiguration configuration,
string? keycloakClientSectionName,
Action<JwtBearerOptions>? configureOptions = default)
{
/* implementation */
}
Example. Authentication + Authorization
Here is how to add JWT-based authentication and custom authorization policy.
var builder = WebApplication.CreateBuilder(args);
var host = builder.Host;
var configuration = builder.Configuration;
var services = builder.Services;
host.ConfigureKeycloakConfigurationSource();
// conventional registration from keycloak.json
services.AddKeycloakAuthentication(configuration);
services.AddAuthorization(options =>
{
options.AddPolicy("RequireWorkspaces", builder =>
{
builder.RequireProtectedResource("workspaces", "workspaces:read") // HTTP request to Keycloak to check protected resource
.RequireRealmRoles("User") // Realm role is fetched from token
.RequireResourceRoles("Admin"); // Resource/Client role is fetched from token
});
})
.AddKeycloakAuthorization(configuration);
var app = builder.Build();
app.UseAuthentication();
app.UseAuthorization();
app.MapGet("/workspaces", () => "[]")
.RequireAuthorization("RequireWorkspaces");
app.Run();
Keycloak.AuthServices.Authentication
Add OpenID Connect + JWT Bearer token authentication.
For example, see Getting Started
Adapter File. Optional
Using appsettings.json
is a recommended and it is an idiomatic approach for .NET, but if you want a standalone "adapter" (installation) file - keycloak.json
. You can use ConfigureKeycloakConfigurationSource
. It adds dedicated configuration source.
// add configuration from keycloak file
host.ConfigureKeycloakConfigurationSource("keycloak.json");
// add authentication services, OICD JwtBearerDefaults.AuthenticationScheme
services.AddKeycloakAuthentication(configuration, o =>
{
o.RequireHttpsMetadata = false;
});
Client roles are automatically transformed into user role claims KeycloakRolesClaimsTransformation.
See Keycloak.AuthServices.Authentication - README.md
Keycloak installation file:
// confidential client
{
"realm": "<realm>",
"auth-server-url": "http://localhost:8088/auth/",
"ssl-required": "external", // external | none
"resource": "<clientId>",
"verify-token-audience": true,
"credentials": {
"secret": ""
}
}
// public client
{
"realm": "<realm>",
"auth-server-url": "http://localhost:8088/auth/",
"ssl-required": "external",
"resource": "<clientId>",
"public-client": true,
"confidential-port": 0
}
Keycloak.AuthServices.Authorization
services.AddAuthorization(authOptions =>
{
authOptions.AddPolicy("<policyName>", policyBuilder =>
{
// configure policies here
});
}).AddKeycloakAuthorization(configuration);
See Keycloak.AuthServices.Authorization - README.md
Keycloak.AuthServices.Sdk
Keycloak API clients.
Service | Description |
---|---|
IKeycloakClient | Unified HTTP client - IKeycloakRealmClient, IKeycloakProtectedResourceClient |
IKeycloakRealmClient | Keycloak realm API |
IKeycloakProtectedResourceClient | Protected resource API |
IKeycloakUserClient | Keycloak user API |
IKeycloakProtectionClient | Authorization server API, used by AddKeycloakAuthorization |
// requires confidential client
services.AddKeycloakAdminHttpClient(keycloakOptions);
// based on token forwarding HttpClient middleware and IHttpContextAccessor
services.AddKeycloakProtectionHttpClient(keycloakOptions);
See Keycloak.AuthServices.Sdk - README.md
Build and Development
dotnet cake --target build
dotnet pack -o ./Artefacts
Blog Posts
For more information and real world examples, please see my blog posts related to Keycloak and .NET https://nikiforovall.github.io/tags.html#keycloak-ref
Reference
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net6.0
- IdentityModel.AspNetCore (>= 4.3.0)
- Keycloak.AuthServices.Common (>= 2.0.0-pre-1)
- Microsoft.AspNetCore.Authentication.JwtBearer (>= 6.0.29)
- Microsoft.AspNetCore.Http.Abstractions (>= 2.2.0)
- Microsoft.Extensions.DependencyInjection.Abstractions (>= 8.0.1)
- Refit (>= 7.0.0)
- Refit.HttpClientFactory (>= 7.0.0)
NuGet packages (3)
Showing the top 3 NuGet packages that depend on Keycloak.AuthServices.Sdk:
Package | Downloads |
---|---|
Gathrr.Framework.Infrastructure
Package Description |
|
Inspire.Framework.Infrastructure
Package Description |
|
Codehard.IdentityProvider.Keycloak
A client library for Codehard's Identity Provider with Keycloak as a provider. |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2.5.5 | 0 | 11/27/2024 |
2.5.3 | 19,924 | 8/19/2024 |
2.5.2 | 9,485 | 6/15/2024 |
2.5.1 | 515 | 6/11/2024 |
2.5.0 | 8,249 | 6/2/2024 |
2.4.1 | 4,843 | 5/16/2024 |
2.4.0 | 663 | 5/12/2024 |
2.3.0 | 288 | 5/10/2024 |
2.3.0-pre-1 | 106 | 5/9/2024 |
2.2.1 | 345 | 5/9/2024 |
2.2.0 | 130 | 5/8/2024 |
2.1.0 | 173 | 5/7/2024 |
2.0.0 | 461 | 5/5/2024 |
2.0.0-pre-4 | 112 | 5/4/2024 |
2.0.0-pre-3 | 168 | 4/26/2024 |
2.0.0-pre-2 | 116 | 4/25/2024 |
2.0.0-pre-1 | 265 | 4/24/2024 |
1.6.0 | 87,514 | 10/25/2023 |
1.5.2 | 63,749 | 5/27/2023 |
1.5.1 | 48,873 | 1/17/2023 |
1.5.0 | 616 | 1/17/2023 |
1.4.1 | 1,011 | 1/12/2023 |
1.4.0 | 518 | 1/4/2023 |
1.3.0 | 1,083 | 12/28/2022 |
1.2.1 | 9,692 | 9/22/2022 |
1.2.0 | 717 | 8/24/2022 |
1.1.0 | 14,477 | 1/30/2022 |
1.0.5 | 142 | 1/29/2022 |
1.0.4 | 3,363 | 1/28/2022 |
1.0.3 | 134 | 1/28/2022 |
1.0.2 | 137 | 1/23/2022 |
1.0.1 | 573 | 1/19/2022 |
1.0.0 | 647 | 1/19/2022 |