Skip to content

Commit

Permalink
Merge pull request #1067 from ITfoxtec/test
Browse files Browse the repository at this point in the history
Test
  • Loading branch information
Revsgaard authored Dec 3, 2024
2 parents 9f508fe + aa3b665 commit fb13c2d
Show file tree
Hide file tree
Showing 125 changed files with 1,727 additions and 386 deletions.
20 changes: 20 additions & 0 deletions FoxIDs.sln
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,7 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "docs", "docs", "{CB5D86A0-D
docs\auth-method-howto-oidc-nets-eid-broker.md = docs\auth-method-howto-oidc-nets-eid-broker.md
docs\auth-method-howto-oidc-signicat.md = docs\auth-method-howto-oidc-signicat.md
docs\auth-method-howto-saml-2.0-adfs.md = docs\auth-method-howto-saml-2.0-adfs.md
docs\auth-method-howto-saml-2.0-google-workspace.md = docs\auth-method-howto-saml-2.0-google-workspace.md
docs\auth-method-howto-saml-2.0-nemlogin.md = docs\auth-method-howto-saml-2.0-nemlogin.md
docs\auth-method-howto-saml-2.0-pingone.md = docs\auth-method-howto-saml-2.0-pingone.md
docs\auth-method-oidc.md = docs\auth-method-oidc.md
Expand Down Expand Up @@ -101,6 +102,8 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "docs", "docs", "{CB5D86A0-D
EndProject
Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "images", "images", "{CB88126F-3F28-4511-93E1-2454E239E9C7}"
ProjectSection(SolutionItems) = preProject
docs\images\bridge-oidc-saml.svg = docs\images\bridge-oidc-saml.svg
docs\images\bridge-saml-oidc.svg = docs\images\bridge-saml-oidc.svg
docs\images\bridge.vsdx = docs\images\bridge.vsdx
docs\images\claim-transform.svg = docs\images\claim-transform.svg
docs\images\claims.vsdx = docs\images\claims.vsdx
Expand All @@ -120,19 +123,23 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "images", "images", "{CB8812
docs\images\configure-email-provider-environment-smtp.png = docs\images\configure-email-provider-environment-smtp.png
docs\images\configure-environment-setting.png = docs\images\configure-environment-setting.png
docs\images\configure-environment.png = docs\images\configure-environment.png
docs\images\configure-external-claims-config.png = docs\images\configure-external-claims-config.png
docs\images\configure-external-login-config.png = docs\images\configure-external-login-config.png
docs\images\configure-external-login-ui.png = docs\images\configure-external-login-ui.png
docs\images\configure-foxids_control_api.png = docs\images\configure-foxids_control_api.png
docs\images\configure-implicit-code-flow.png = docs\images\configure-implicit-code-flow.png
docs\images\configure-jwt-saml-mappings.png = docs\images\configure-jwt-saml-mappings.png
docs\images\configure-log-stream-appinsight.png = docs\images\configure-log-stream-appinsight.png
docs\images\configure-log.png = docs\images\configure-log.png
docs\images\configure-login-2fa.png = docs\images\configure-login-2fa.png
docs\images\configure-login-advanced.png = docs\images\configure-login-advanced.png
docs\images\configure-login-css-backbround-image.png = docs\images\configure-login-css-backbround-image.png
docs\images\configure-login-css-backbround-logo.png = docs\images\configure-login-css-backbround-logo.png
docs\images\configure-login-css-sample-test.png = docs\images\configure-login-css-sample-test.png
docs\images\configure-login-customization.png = docs\images\configure-login-customization.png
docs\images\configure-login-hrd-example.png = docs\images\configure-login-hrd-example.png
docs\images\configure-login-hrd.png = docs\images\configure-login-hrd.png
docs\images\configure-login-session.png = docs\images\configure-login-session.png
docs\images\configure-login-title-icon-css.png = docs\images\configure-login-title-icon-css.png
docs\images\configure-login.png = docs\images\configure-login.png
docs\images\configure-oauth-resource.png = docs\images\configure-oauth-resource.png
Expand All @@ -148,11 +155,19 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "images", "images", "{CB8812
docs\images\configure-saml-adfs-auth-method.png = docs\images\configure-saml-adfs-auth-method.png
docs\images\configure-saml-app-reg.png = docs\images\configure-saml-app-reg.png
docs\images\configure-saml-auth-method.png = docs\images\configure-saml-auth-method.png
docs\images\configure-saml-googleworkspace-add-app.png = docs\images\configure-saml-googleworkspace-add-app.png
docs\images\configure-saml-googleworkspace-app.png = docs\images\configure-saml-googleworkspace-app.png
docs\images\configure-saml-googleworkspace-auth-method.png = docs\images\configure-saml-googleworkspace-auth-method.png
docs\images\configure-saml-googleworkspace-start-auth-method.png = docs\images\configure-saml-googleworkspace-start-auth-method.png
docs\images\configure-saml-manual-auth-method.png = docs\images\configure-saml-manual-auth-method.png
docs\images\configure-tenant-adminuser.png = docs\images\configure-tenant-adminuser.png
docs\images\configure-tenant-custom-domain-environment.png = docs\images\configure-tenant-custom-domain-environment.png
docs\images\configure-tenant-custom-domain-my-environment.png = docs\images\configure-tenant-custom-domain-my-environment.png
docs\images\configure-tenant-text.png = docs\images\configure-tenant-text.png
docs\images\configure-tenant.png = docs\images\configure-tenant.png
docs\images\configure-user-external.png = docs\images\configure-user-external.png
docs\images\configure-user-mfa.png = docs\images\configure-user-mfa.png
docs\images\configure-user.png = docs\images\configure-user.png
docs\images\connections-app-reg-oauth.svg = docs\images\connections-app-reg-oauth.svg
docs\images\connections-app-reg-oidc.svg = docs\images\connections-app-reg-oidc.svg
docs\images\connections-app-reg-saml.svg = docs\images\connections-app-reg-saml.svg
Expand All @@ -162,6 +177,7 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "images", "images", "{CB8812
docs\images\connections-oauth.svg = docs\images\connections-oauth.svg
docs\images\connections-oidc.svg = docs\images\connections-oidc.svg
docs\images\connections-saml.svg = docs\images\connections-saml.svg
docs\images\connections.svg = docs\images\connections.svg
docs\images\connections.vsdx = docs\images\connections.vsdx
docs\images\environments.vsdx = docs\images\environments.vsdx
docs\images\example-claim-transform-name-to-given_name-family_name.png = docs\images\example-claim-transform-name-to-given_name-family_name.png
Expand All @@ -180,6 +196,8 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "images", "images", "{CB8812
docs\images\how-to-context-handler-rp.svg = docs\images\how-to-context-handler-rp.svg
docs\images\how-to-context-handler.svg = docs\images\how-to-context-handler.svg
docs\images\how-to-environment-link.svg = docs\images\how-to-environment-link.svg
docs\images\how-to-nemlogin-environment-link.svg = docs\images\how-to-nemlogin-environment-link.svg
docs\images\how-to-nemlogin.svg = docs\images\how-to-nemlogin.svg
docs\images\how-to.vsdx = docs\images\how-to.vsdx
docs\images\howto-environmentlink-foxids-auth-method-select.png = docs\images\howto-environmentlink-foxids-auth-method-select.png
docs\images\howto-environmentlink-foxids-auth-method-y-select.png = docs\images\howto-environmentlink-foxids-auth-method-y-select.png
Expand All @@ -199,6 +217,7 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "images", "images", "{CB8812
docs\images\howto-oidc-google-scopes.png = docs\images\howto-oidc-google-scopes.png
docs\images\howto-oidc-google-usertype.png = docs\images\howto-oidc-google-usertype.png
docs\images\howto-oidc-identityserver-readredirect.png = docs\images\howto-oidc-identityserver-readredirect.png
docs\images\howto-saml-claim-mappings.png = docs\images\howto-saml-claim-mappings.png
docs\images\howto-saml-context-handler-app-base-config-reg.png = docs\images\howto-saml-context-handler-app-base-config-reg.png
docs\images\howto-saml-context-handler-app-base-config.png = docs\images\howto-saml-context-handler-app-base-config.png
docs\images\howto-saml-context-handler-app-ct1.png = docs\images\howto-saml-context-handler-app-ct1.png
Expand Down Expand Up @@ -228,6 +247,7 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "images", "images", "{CB8812
docs\images\language-german.png = docs\images\language-german.png
docs\images\language-spanish.png = docs\images\language-spanish.png
docs\images\main-tenant.png = docs\images\main-tenant.png
docs\images\master-tenant-admin-user.png = docs\images\master-tenant-admin-user.png
docs\images\master-tenant2.png = docs\images\master-tenant2.png
docs\images\sample_seed-client.png = docs\images\sample_seed-client.png
docs\images\search-logs.png = docs\images\search-logs.png
Expand Down
2 changes: 1 addition & 1 deletion docs/_sidebar.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
- [Description](index.md)
- [Get started](get-started.md)
- [How to](howto-connect.md)
- [Authentication](howto-connect.md#how-to-connect-authentication-methods)
- [Applications](howto-connect.md#how-to-connect-applications)
- [Authentication methods](howto-connect.md#how-to-connect-authentication-methods)
- [Development](development.md)
- [.NET Samples](samples.md)
- [SAML / OpenID Connect bridge](bridge.md)
Expand Down
2 changes: 1 addition & 1 deletion docs/auth-method-howto-oidc-azure-ad-b2c.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Connect Azure AD B2C as authentication method
# Connect Azure AD B2C with OpenID Connect

FoxIDs can be connected to Azure AD B2C with OpenID Connect and thereby authenticating end users in an Azure AD B2C tenant.

Expand Down
6 changes: 3 additions & 3 deletions docs/auth-method-howto-oidc-azure-ad.md
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
# Connect Microsoft Entra ID as authentication method
# Connect Microsoft Entra ID with OpenID Connect

FoxIDs can be connected to Microsoft Entra ID (Azure AD) with OpenID Connect and thereby authenticating end users in a Microsoft Entra ID tenant.

It is possible to connect both a [single tenant](#configure-single-tenant) and [multitenant](#configure-multitenant) Microsoft Entra ID App as an authentication method on FoxIDs using OpenID Connect.
A more complex case is to [read claims form the access token](#read-claims-from-access-token).
If you configure [App roles](#app-roles) they are returned in the `roles` claim.

> You can test the Microsoft Entra ID login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Microsoft Entra ID`.
> You can test the Microsoft Entra ID login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Microsoft Entra ID`.
> Take a look at the Microsoft Entra ID sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp)
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab.
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab.
## Configure single tenant

Expand Down
8 changes: 4 additions & 4 deletions docs/auth-method-howto-oidc-facebook.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,18 @@
# Connect Facebook as authentication method
# Connect Facebook with OpenID Connect

FoxIDs can be connected to Facebook with OpenID Connect and authenticate users with Facebook login or Facebook Limited login.

> You can test the Facebook login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Facebook`.
> You can test the Facebook login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Facebook`.
> Take a look at the Facebook sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp)
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab.
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab.
## Configure Facebook

This chapter describes how to configure a connection with OpenID Connect Authorization Code flow and read the users claims from the ID token.

**1 - Start by creating an OpenID Connect authentication method in [FoxIDs Control Client](control.md#foxids-control-client)**

1. Navigate to the **Authentication Methods** tab
1. Navigate to the **Authentication** tab
2. Click **New authentication**
3. Select **OpenID Provider**
4. Add the **Name** e.g. Facebook
Expand Down
8 changes: 4 additions & 4 deletions docs/auth-method-howto-oidc-google.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,18 @@
# Connect Google as authentication method
# Connect Google with OpenID Connect

FoxIDs can be connected to Google with OpenID Connect and authenticate users with Google login.

> You can test the Google login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Google`.
> You can test the Google login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Google`.
> Take a look at the Google sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp)
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab.
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab.
## Configure Google

This chapter describes how to configure a connection with OpenID Connect Authorization Code flow + PKCE and read the users claims from the ID token.

**1 - Start by creating an OpenID Connect authentication method in [FoxIDs Control Client](control.md#foxids-control-client)**

1. Navigate to the **Authentication Methods** tab
1. Navigate to the **Authentication** tab
2. Click **New authentication**
3. Select **OpenID Provider**
4. Add the **Name** e.g. Google
Expand Down
4 changes: 2 additions & 2 deletions docs/auth-method-howto-oidc-identityserver.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Connect IdentityServer as authentication method
# Connect IdentityServer with OpenID Connect

FoxIDs can be connected to an IdentityServer with OpenID Connect and thereby authenticating end users in an IdentityServer.

Expand All @@ -9,7 +9,7 @@ It is possible to connect an [IdentityServer client](#configure-identityserver-c
> The `IdentityServerOidcOpSample` sample is configured with Implicit Flow to enable local testing, please use Authorization Code Flow in production.
> Take a look at the IdentityServer sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp)
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab.
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab.
## Configure IdentityServer

Expand Down
6 changes: 3 additions & 3 deletions docs/auth-method-howto-oidc-nets-eid-broker.md
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
# Connect Nets eID Broker as authentication method
# Connect Nets eID Broker with OpenID Connect

FoxIDs can be connected to Nets eID Broker with OpenID Connect and thereby authenticating end users with MitID and other credentials supported by Nets eID Broker.

How to configure Nets eID Broker in
- [test environment](#configuring-nets-eid-broker-demotest-as-openid-provider-op) using Nets eID Broker demo
- [production environment](#configuring-nets-eid-broker-as-openid-provider-op) using Nets eID Broker admin portal

> You can test the Nets eID Broker demo login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Nets eID Broker TEST`.
> You can test the Nets eID Broker demo login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Nets eID Broker TEST`.
> Take a look at the Nets eID Broker sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp)
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab.
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab.
## Configuring Nets eID Broker demo/test as OpenID Provider (OP)

Expand Down
6 changes: 3 additions & 3 deletions docs/auth-method-howto-oidc-signicat.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
# Connect Signicat as authentication method
# Connect Signicat with OpenID Connect

FoxIDs can be connected to Signicat with OpenID Connect and thereby authenticating end users with MitID and all other credentials supported by Signicat.

> You can test the Signicat Express login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Signicat TEST`.
> You can test the Signicat Express login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Signicat TEST`.
> Take a look at the Signicat Express sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp)
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab.
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab.
You can create a [free account](https://www.signicat.com/sign-up/express-api-onboarding) on [Signicat Express](https://developer.signicat.com/express/docs/) and get access to the [dashbord](https://dashboard-test.signicat.io/dashboard).
Her you have access to the test environment.
Expand Down
4 changes: 2 additions & 2 deletions docs/auth-method-howto-saml-2.0-adfs.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Connect Microsoft AD FS as authentication method
# Connect Microsoft AD FS with SAML 2.0

FoxIDs can be connected to AD FS with a [SAML 2.0 authentication method](auth-method-saml-2.0.md). Where AD FS is a SAML 2.0 Identity Provider (IdP) and FoxIDs is acting as an SAML 2.0 Relying Party (RP).

Expand All @@ -15,7 +15,7 @@ Recommended SAML 2.0 bindings:
Remark; The authn request redirect binding can result in a long query string which can cause problems I some devices. Therefore post binding is preferable.

> Take a look at the AD FS sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp)
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab.
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab.
The following screen shot show the basic FoxIDs SAML 2.0 authentication method configuration using AD FS metadata in [FoxIDs Control Client](control.md#foxids-control-client).

Expand Down
Loading

0 comments on commit fb13c2d

Please sign in to comment.