Skip to content
This repository was archived by the owner on Dec 13, 2018. It is now read-only.

Port the WsFederation middleware from Katana #43

Closed
Tratcher opened this issue Aug 21, 2014 · 73 comments
Closed

Port the WsFederation middleware from Katana #43

Tratcher opened this issue Aug 21, 2014 · 73 comments

Comments

@Tratcher
Copy link
Member

Depends on System.IdentityModel.Tokens.Jwt and Microsoft.IdentityModel.Protocol.Extensions.

@StevenVandenBroeck
Copy link

Any news on WsFederation in ASP.NET 5 ?

@blowdart
Copy link
Member

The dependency still stands and that work has not yet been completed by the team that owns the IdentityModel pieces.

@brockallen
Copy link

Any plans to add signoutcleanup support? That was missing in Katata v3's implementation. It's nice to have single sign-on, but single sign-out is also nice :)

@brentschmaltz
Copy link
Contributor

signoutcleanup is on the map.

WsFed in on the map also, no time frame yet.

@rsbavaresco
Copy link

Hi,
how about it, now?

@blowdart
Copy link
Member

We're still awaiting support from the WAAD team, they're the ones driving it.

@brentschmaltz
Copy link
Contributor

Yep, it is on our plates and radar. No promises till we drop OIDC.

@lomithrani
Copy link

Is there any alternative to authentify using wsfederation or saml2 meanwhile ?

@Eilon Eilon removed the 0 - Backlog label Jun 25, 2015
@Eilon Eilon added this to the 1.0.0 backlog milestone Jun 25, 2015
@aredfox
Copy link

aredfox commented Sep 7, 2015

Is there any news on the feature / roadmap for this feature, as this is now holding back starting new applications in ASPNET5 for our organisation.

@Eilon Eilon modified the milestones: Backlog, 1.0.0 backlog Sep 24, 2015
@marc-mueller
Copy link

Is there any update so far? Not being able to support SAML within our ASP.NET 5 application is currently a showstopper for our project since we have some dependencies with existing systems.

@Tratcher
Copy link
Member Author

Tratcher commented Jan 4, 2016

This is not happening for v1.0. We'll follow up afterwards.

@marc-mueller
Copy link

So this means that the development has not started yet? Is there any estimation about the release?

@Tratcher
Copy link
Member Author

Tratcher commented Jan 5, 2016

Correct. No, we haven't scheduled any of the post-v1 work yet.

@rschiefer
Copy link

We use ADFS extensively for 20 or so internal web applications. This would be a major blocker for us to migrate to ASP.NET Core.

Can someone post a link to the related dependencies so we can go show support for that work as well?

@helmsb
Copy link

helmsb commented Feb 11, 2016

We've used ADFS as the core of our authentication for our internal application framework which is used throughout our organization. This is a huge blocker for us going to .NET Core.

@Tratcher
Copy link
Member Author

@MaximRouiller
Copy link

Just bouncing this again. I'm still seeing people trying the Katana bits with .NET Core.

I'll refer them to this issue.

@leastprivilege
Copy link
Contributor

Maybe it is just me - but I see a lot of companies using ADFS via WS-Fed. They are all blocked to move forward to ASP.NET Core (let alone .NET Core).

Is this a way to push adoption of Windows Server 2016 ;) (I am afraid this does not work that way)

@marc-mueller
Copy link

I fully agree with @leastprivilege. There are so many large companies with their ADFS via WS-Fed setup and they won't change that fast. On the development side we are faster then on the infrastructure side and this would allow us to push ASP.NET Core.

@brentschmaltz
Copy link
Contributor

brentschmaltz commented Nov 15, 2016

@leastprivilege @marc-mueller @MaximRouiller @helmsb the roadmap to make this happen is fully understood. Everytime I bring it up, the beancounters ask who really cares, if you do care, contact your contacts here at MSFT directly.

@Tratcher dotnet/corefx#4278 is the start of it. CoreFx is the rightfull owner of SignedXml. Once that is in place, IM can re-introduce EnveopledSignatureReader (which should be in IM) and an updated SamlToken / Handler and WsFedSupport.

@MaximRouiller
Copy link

@brentschmaltz Right now, I don't. I just see a confusion around the packages.

I'll talk to my beancounter if I ever need it urgently.

@brentschmaltz
Copy link
Contributor

@MaximRouiller I was referring my Microsoft beancounters who want to ensure the number 1 priorities are what we are focused on. So they need to hear from you.

@abezulski
Copy link

@DaleMckeown Are you using ADFS3? If so, could you provide some samples? I'm porting MVC5 apps to .net core and having issues with ADFS integration.

@DaleMckeown
Copy link

@abezulski Yeah, we are using Oauth2 with ADFS3.0.

Can't give you a working example unfortunately, but me and @lilpug followed this post on carbon60: http://www.carbon60.com/blog/using-adfs-3-0-with-mvc-6-asp-net-5

Took us a while to modify the source code accordingly, but we go there in the end. David documented the changes made to get it working in a comment on the above blog post.

@YaoNiGu
Copy link

YaoNiGu commented Sep 8, 2017

has anyone known any information about using adfs 2.0 in core2.0 ?

@Tratcher
Copy link
Member Author

Tratcher commented Sep 8, 2017

@YaoNiGu It's not yet available. We've just started the work.

@ctro
Copy link

ctro commented Sep 12, 2017

We need to access a legacy SOAP service that authenticates with WS-Security (WSS) from a .NET Core app. We are looking for WSFed support also.
I work in Government IT. .NET Core and Azure have much promise here, but we very often need to access legacy datasources.

@ashgadala
Copy link

Do you have an ETA on when this will this will be addressed.

@danroth27
Copy link
Member

@ashgadala The work has started. I expect we'll have something in preview before the end of the year.

@Tratcher Tratcher modified the milestones: 2.1.0, 2.0.0-wsfed Sep 15, 2017
@ashgadala
Copy link

@danroth27 Wonderful. Thank you so much for the update.

@Tratcher
Copy link
Member Author

The eager can start tracking the work in this branch: https://github.com/aspnet/security/tree/tratcher/wsfed.

The plan is to start by releasing a 2.0.0 compatible preview package off cycle from the normal ASP.NET Core milestones (e.g. ASAP). We'll let you know when something is available on myget.org.

@Tratcher
Copy link
Member Author

Reminder - Apply this change when moving to 2.1: #1188

@Infoseeker
Copy link

@chrisdrobison - any updates on https://github.com/chrisdrobison/aspnetcore-wsfed - working with asp.net cpre 2 ?

@Tratcher
Copy link
Member Author

Tratcher commented Oct 9, 2017

An official preview is now available. See: #1473

@Tratcher
Copy link
Member Author

Tratcher commented Oct 9, 2017

Doc bug: dotnet/AspNetCore.Docs#4523

@Eilon Eilon added the 3 - Done label Nov 2, 2017
@Eilon
Copy link
Contributor

Eilon commented Nov 2, 2017

Closing because the bulk of the work is done and in the public preview. We'll track any additional features and bugs as separate issues.

@Eilon Eilon closed this as completed Nov 2, 2017
Tratcher added a commit that referenced this issue Feb 5, 2018
…d tests.

#1443 Block unsolicited wsfed logins by default.
#1520 Update WsFed to use the 2.0 event structure
#1425 Implement WsFed remote signout cleanup
Rework WsFed RemoteSignOutPath logic to work with ADFS #1581
Update versions, dependencies.
Tratcher added a commit that referenced this issue Feb 6, 2018
…d tests.

#1443 Block unsolicited wsfed logins by default.
#1520 Update WsFed to use the 2.0 event structure
#1425 Implement WsFed remote signout cleanup
Rework WsFed RemoteSignOutPath logic to work with ADFS #1581
Update versions, dependencies.
Tratcher added a commit that referenced this issue Feb 12, 2018
…d tests.

#1443 Block unsolicited wsfed logins by default.
#1520 Update WsFed to use the 2.0 event structure
#1425 Implement WsFed remote signout cleanup
Rework WsFed RemoteSignOutPath logic to work with ADFS #1581
Update versions, dependencies.
Tratcher added a commit that referenced this issue Feb 26, 2018
…d tests.

#1443 Block unsolicited wsfed logins by default.
#1520 Update WsFed to use the 2.0 event structure
#1425 Implement WsFed remote signout cleanup
Rework WsFed RemoteSignOutPath logic to work with ADFS #1581
Update versions, dependencies.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests