MVC JWT Token Demo
- Install Swashbuckle.Aspnetcore
1.Right-click the API project in Solution Explorer and select Manage NuGet Packages
2.Type Swashbuckle.AspNetCore in the search box
3.Select Swashbuckle.AspNetCore and click Install
- Configure Swagger Middleware
services.AddSwaggerGen();
- Configure
// This middleware serves generated Swagger document as a JSON endpoint
app.UseSwagger();
// This middleware serves the Swagger documentation UI
app.UseSwaggerUI(c =>
{
c.SwaggerEndpoint("/swagger/v1/swagger.json", "Employee API V1");
});
URL for document: https://localhost:44379/swagger/index.html
https://localhost:44379/swagger/v1/swagger.json
In Program.cs, we add following code
.ConfigureLogging(logBuilder =>
{
logBuilder.ClearProviders(); // removes all providers from LoggerFactory
logBuilder.AddConsole();
logBuilder.AddTraceSource("Information, ActivityTracing"); // Add Trace listener provider
})
- add code in startup.cs with methodd Configure
public void Configure(IApplicationBuilder app, IHostingEnvironment env, ILoggerFactory loggerFactory) { // other code remove for clarity loggerFactory.AddFile("Logs/mylog-{Date}.txt"); }
- install package through PackageManager console
Install-Package Serilog.Extensions.Logging.File -Version 2.0.0
- wwwroot folder in the ASP.NET Core project is treated as a web root folder
- Static files can be stored in any folder under the web root and accessed with a relative path to that root
-> wwwroot -> right click -> add file - Client-side Libarary
- right click on libman.json file and select "Restore Client-Side Libraries" from the context menu
JWTToken - https://jwt.io/introduction
Step 1 :- Generate
- `public string GenerateJSONWebToken()
{
// when he is validated AD
var securityKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_config["Jwt:Key"]));
var credentials = new SigningCredentials(securityKey, SecurityAlgorithms.HmacSha256);
var claims = new[] {
new Claim(JwtRegisteredClaimNames.Sub, "sar"),
new Claim(JwtRegisteredClaimNames.Email, "[email protected]"),
new Claim("Role", "Admin"),
new Claim(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString())
};
var token = new JwtSecurityToken(_config["Jwt:Issuer"],
_config["Jwt:Issuer"],
claims,
expires: DateTime.Now.AddMinutes(120),
signingCredentials: credentials);
return new JwtSecurityTokenHandler().WriteToken(token);
}`
Step 2: Attache the middle ware
` services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
.AddJwtBearer(options =>
{
options.TokenValidationParameters = new TokenValidationParameters
{
ValidateIssuer = true,
ValidateAudience = true,
ValidateLifetime = true,
ValidateIssuerSigningKey = true,
ValidIssuer = Configuration["Jwt:Issuer"],
ValidAudience = Configuration["Jwt:Issuer"],
IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(Configuration["Jwt:Key"]))
};
});`
Step 3: Add data in file appsettings.json
`"Jwt": {
"Key": "545454568686869898989",
"Issuer": "sarveshsoft"
}`