Replies: 3 comments 9 replies
-
I think I see your point. You would want to use Ps.: the reason JWT token already has that, is bc we provide an extension on the existing one; the JWT authorization we have in place (and implemented ourselves) is also using the filters. |
Beta Was this translation helpful? Give feedback.
-
I do like the idea of being compliant with the mechanisms provided by ASP.NET Core. I also get the point of @stijnmoreels that fine-grained control can be useful, but if I understand the docs correctly you can also use attributes to specify which authentication scheme you want to use. |
Beta Was this translation helpful? Give feedback.
-
So, what would be the conclusion of this discussion ? |
Beta Was this translation helpful? Give feedback.
-
First of all, I'd like to say that the current authentication implementations that are available in Arcus work well and are easy to use. (I'm talking about these [outdated docs] ).
However, it looks to me that they do not play well with the authentication mechanisms that are provided by Microsoft in ASP.NET Core.
If you'd like to use the
Authorize
attribute for instance, you'll need to register one (or more) authentication-scheme's and corresponding authentication handlers. (See this info).Shouldn't we rework our auth implementations so that it is compliant with the mechanisms that ASP.NET Core already provide ? We could do that by implementing our own
AuthenticationHandler
for shared accesskey / API key authentication and Certificate authentication. (TheAddJwtBearer
extension method inside Arcus already uses these mechanisms).Any ideas or opinions @stijnmoreels , @gverstraete, @meersschautarnaud ?
Beta Was this translation helpful? Give feedback.
All reactions