Auth0Net.DependencyInjection

2025-12-07 0 691

Auth0.NET Dependency Injection Extensions

Integrating Auth0.NET into your project whilst following idiomatic .NET conventions can be cumbersome and involve a sizable amount of boilerplate shared between projects.

This library hopes to solve that problem, featuring:

✅ Extensions for Microsoft.Extensions.DependencyInjection.

✅ Automatic access token caching & renewal for the Management API and your own REST & Grpc services

✅ HttpClientFactory integration for centralized extensibility and management of the internal HTTP handlers.

IHttpClientBuilder extensions, providing handlers to automatically append access tokens to outgoing requests.

This library is compatible with .NET 8+ as well as .NET Framework 4.8 and is suitable for use in ASP.NET Core and standalone .NET Generic Host applications.

Install

Add Auth0Net.DependencyInjection to your project:

dotnet add package Auth0Net.DependencyInjection

Scenarios

Authentication Client Only

If you\’re simply using the AuthenticationApiClient and nothing else, you can call AddAuth0AuthenticationClientCore and pass in your Auth0 Domain. This integration is lightweight and does not support any other features of this library.

services.AddAuth0AuthenticationClientCore(\"your-auth0-domain.auth0.com\");

You can then request the IAuthenticationApiClient within your class:

public class AuthController : ControllerBase
{
    private readonly IAuthenticationApiClient _authenticationApiClient;

    public AuthController(IAuthenticationApiClient authenticationApiClient)
    {
        _authenticationApiClient = authenticationApiClient;
    }

Authentication Client + Management Client

Add the AuthenticationApiClient with AddAuth0AuthenticationClient, and provide a machine-to-machine application configuration that will be consumed by the Management Client, Token Cache and IHttpClientBuilder integrations. This extension must be called before using any other extensions within this library:

services.AddAuth0AuthenticationClient(config =>
{
   config.Domain = builder.Configuration[\"Auth0:Domain\"];
   config.ClientId = builder.Configuration[\"Auth0:ClientId\"];
   config.ClientSecret = builder.Configuration[\"Auth0:ClientSecret\"];
});

Add the ManagementApiClient with AddAuth0ManagementClient() and add the DelegatingHandler with AddManagementAccessToken() that will attach the Access Token automatically:

services.AddAuth0ManagementClient().AddManagementAccessToken();

Ensure your Machine-to-Machine application is authorized to request tokens from the Managment API and it has the correct scopes for the features you wish to use.

You can then request the IManagementApiClient (or IAuthenticationApiClient) within your services:

public class MyAuth0Service : IAuth0Service
{
    private readonly IManagementApiClient _managementApiClient;

    public MyAuth0Service(IManagementApiClient managementApiClient)
    {
        _managementApiClient = managementApiClient;
    }

Handling Custom Domains

If you\’re using a custom domain with your Auth0 tenant, you may run into a problem whereby the audience of the Management API is being incorrectly set. You can override this via the Audience property:

services.AddAuth0ManagementClient()
    .AddManagementAccessToken(c =>
    {
        c.Audience = \"my-tenant.au.auth0.com\";
    });

With HttpClient and/or Grpc Services (Machine-To-Machine tokens)

Note: This feature relies on services.AddAuth0AuthenticationClient(config => ...) being called and configured as outlined in the previous scenario.

This library includes a delegating handler – effectively middleware for your HttpClient – that will append an access token to all outbound requests. This is useful for calling other services that are protected by Auth0. This integration requires your service implementation to use IHttpClientFactory as part of its registration. You can read more about it here

HttpClient

Use AddAccessToken along with the required audience:

services.AddHttpClient<MyHttpService>(x => x.BaseAddress = new Uri(builder.Configuration[\"MyHttpService:Url\"]))
        .AddAccessToken(config => config.Audience = builder.Configuration[\"MyHttpService:Audience\"]);

Grpc

This extension is compatible with any registration that returns a IHttpClientBuilder, thus it can be used with Grpc\’s client factory:

services.AddGrpcClient<UserService.UserServiceClient>(x => x.Address = new Uri(builder.Configuration[\"MyGrpcService:Url\"]))
        .AddAccessToken(config => config.Audience = builder.Configuration[\"MyGrpcService:Audience\"]);

Advanced

AddAccessToken also has an option for passing in a func that can resolve the audience at runtime. This can be useful if your expected audiences always follow a pattern, or if you rely on service discovery, such as from Steeltoe.NET:

services.AddHttpClient<MyHttpService>(x=> x.BaseAddress = new Uri(\"https://M*y*S*erviceName/\"))
        .AddServiceDiscovery()
        .AddAccessToken(config => config.AudienceResolver = request => request.RequestUri.GetLeftPart(UriPartial.Authority));

Additional Functionality

Enhanced Resilience

The default rate-limit behaviour in Auth0.NET is suboptimal, as it uses random backoff rather than reading the rate limit headers returned by Auth0.
This package includes an additional .AddAuth0RateLimitResilience() extension that adds improved rate limit handling to the Auth0 clients.
If you\’re running into rate limit failures, I highly recommend adding this functionality:

services.AddAuth0ManagementClient()
    .AddManagementAccessToken()
    .AddAuth0RateLimitResilience();

When a retry occurs, you should see a warning log similar to:

Resilience event occurred. EventName: \'\"OnRetry\"\', Source: \'\"IManagementConnection-RateLimitRetry\"/\"\"/\"Retry\"\', Operation Key: \'null\', Result: \'429\'

Utility

This library exposes a simple string extension, ToHttpsUrl(), that can be used to format the naked Auth0 domain sitting in your configuration into a proper URL.

This is identical to https://{Conf*ig*ur*ation[\"Auth0:Domain\"]}/ that you usually end up writing somewhere in your Startup.cs.

For example, formatting the domain for the JWT Authority:

.AddJwtBearer(options =>
             {
                 // \"my-tenant.auth0.com\" -> \"https://my-tenant.**a*uth0.com/\"
                 options.Authority = builder.Configuration[\"Auth0:Domain\"].ToHttpsUrl();
                 //...
             });

Internals

Client Lifetimes

Both the authentication and authorization clients are registered as singletons and are suitable for injection into any other lifetime.

Samples

Both a .NET Generic Host and ASP.NET Core example are available in the samples directory.

Internal Cache

The Auth0TokenCache will cache a token for a given audience until at least 95% of the expiry time. If a request to the cache is made between 95% and 99% of expiry, the token will be refreshed in the background before expiry is reached.

An additional 1% of lifetime is removed to protect against clock drift between distributed systems.

In some situations you might want to request an access token from Auth0 manually. You can achieve this by injecting IAuth0TokenCache into a class and calling GetTokenAsync with the audience of the API you\’re requesting the token for.

An in-memory-only instance of FusionCache is used as the caching implementation. This instance is named and will not impact other usages of FusionCache.

Disclaimer

I am not affiliated with nor represent Auth0. All implementation issues regarding the underlying ManagementApiClient and AuthenticationApiClient should go to the official Auth0.NET Respository.

License notices

Icons used under the MIT License from the Identicons pack.

下载源码

通过命令行克隆项目:

git clone https://github.com/Hawxy/Auth0Net.DependencyInjection.git

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

申明:本文由第三方发布,内容仅代表作者观点,与本网站无关。对本文以及其中全部或者部分内容的真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。本网发布或转载文章出于传递更多信息之目的,并不意味着赞同其观点或证实其描述,也不代表本网对其真实性负责。

左子网 开发教程 Auth0Net.DependencyInjection https://www.zuozi.net/31413.html

cgibashopts
上一篇: cgibashopts
Known
下一篇: Known
常见问题
  • 1、自动:拍下后,点击(下载)链接即可下载;2、手动:拍下后,联系卖家发放即可或者联系官方找开发者发货。
查看详情
  • 1、源码默认交易周期:手动发货商品为1-3天,并且用户付款金额将会进入平台担保直到交易完成或者3-7天即可发放,如遇纠纷无限期延长收款金额直至纠纷解决或者退款!;
查看详情
  • 1、描述:源码描述(含标题)与实际源码不一致的(例:货不对板); 2、演示:有演示站时,与实际源码小于95%一致的(但描述中有”不保证完全一样、有变化的可能性”类似显著声明的除外); 3、发货:不发货可无理由退款; 4、安装:免费提供安装服务的源码但卖家不履行的; 5、收费:价格虚标,额外收取其他费用的(但描述中有显著声明或双方交易前有商定的除外); 6、其他:如质量方面的硬性常规问题BUG等。 注:经核实符合上述任一,均支持退款,但卖家予以积极解决问题则除外。
查看详情
  • 1、左子会对双方交易的过程及交易商品的快照进行永久存档,以确保交易的真实、有效、安全! 2、左子无法对如“永久包更新”、“永久技术支持”等类似交易之后的商家承诺做担保,请买家自行鉴别; 3、在源码同时有网站演示与图片演示,且站演与图演不一致时,默认按图演作为纠纷评判依据(特别声明或有商定除外); 4、在没有”无任何正当退款依据”的前提下,商品写有”一旦售出,概不支持退款”等类似的声明,视为无效声明; 5、在未拍下前,双方在QQ上所商定的交易内容,亦可成为纠纷评判依据(商定与描述冲突时,商定为准); 6、因聊天记录可作为纠纷评判依据,故双方联系时,只与对方在左子上所留的QQ、手机号沟通,以防对方不承认自我承诺。 7、虽然交易产生纠纷的几率很小,但一定要保留如聊天记录、手机短信等这样的重要信息,以防产生纠纷时便于左子介入快速处理。
查看详情

相关文章

猜你喜欢
发表评论
暂无评论
官方客服团队

为您解决烦忧 - 24小时在线 专业服务