CoreTokenExtensions.cs 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226
  1. using System;
  2. using System.Collections.Generic;
  3. using System.Text;
  4. using System.IdentityModel.Tokens.Jwt;
  5. using System.Security.Claims;
  6. using Microsoft.IdentityModel.Tokens;
  7. using Microsoft.Identity.Client;
  8. using System.ComponentModel;
  9. using System.Threading.Tasks;
  10. using Azure.Security.KeyVault.Secrets;
  11. using Azure.Identity;
  12. using System.Collections.Concurrent;
  13. using Microsoft.Extensions.Configuration;
  14. using Microsoft.IdentityModel.Protocols.OpenIdConnect;
  15. using Microsoft.IdentityModel.Protocols;
  16. namespace TEAMModelOS.SDK.Extension
  17. {
  18. public static class CoreTokenExtensions
  19. { //var issuer = Configuration.GetValue<string>("JwtSettings:Issuer");
  20. //var signKey = Configuration.GetValue<string>("JwtSettings:SignKey");
  21. private const string issuer = "account.teammodel";
  22. //Azure AD 租用戶識別碼(國際、大陸)
  23. private static List<string> tenantids = new List<string> { "73a2bcc5-fe99-4566-aa8a-07e7bb287df1", "4807e9cf-87b8-4174-aa5b-e76497d7392b" };
  24. private static ConcurrentDictionary<string, KeyVaultSecret> KeyVaultSecrets { get; } = new ConcurrentDictionary<string, KeyVaultSecret>();
  25. #region Access Token
  26. /// <summary>
  27. /// 產生AccessToken
  28. /// </summary>
  29. /// <param name="clientID"></param>
  30. /// <param name="location">服務位置,Global or China ...</param>
  31. /// <returns></returns>
  32. public static async ValueTask<AuthenticationResult> CreateAccessToken(string clientID, string clientSecret, string location)
  33. {
  34. //從金鑰庫取出秘密,此作法讓所有端直接刷新金鑰,無需傳送秘密,SPA更適用
  35. var secret = clientSecret ?? (await GetClientIDSecret(clientID, location)).Value;
  36. var sts = Enum.Parse<STSEndpoint>(location, true);
  37. IConfidentialClientApplication app;
  38. app = ConfidentialClientApplicationBuilder.Create(clientID)
  39. .WithClientSecret(secret)
  40. .WithAuthority(new Uri(sts.GetDescriptionText()))
  41. .Build();
  42. var scope = ((STSScope)sts).GetDescriptionText();
  43. var result = await app.AcquireTokenForClient(new[] { scope }).ExecuteAsync();
  44. return result;
  45. }
  46. //https://learn.microsoft.com/zh-cn/entra/identity-platform/access-tokens 验证的相关文档
  47. //https://login.chinacloudapi.cn/4807e9cf-87b8-4174-aa5b-e76497d7392b/v2.0/.well-known/openid-configuration
  48. public static async Task<JwtSecurityToken> Validate(string jwtTokenToValidate, string location,string tenantId, IConfiguration configuration)
  49. {
  50. // var tenantId = "4807e9cf-87b8-4174-aa5b-e76497d7392b";
  51. var OpenidConfiguration = Enum.Parse<STSOpenidConfiguration>(location, true);
  52. var openIdConnectWellKnownConfigUri = new Uri(OpenidConfiguration.GetDescriptionText());
  53. //With the Input token to be validated...
  54. //With the above information we can validate all key aspects of the Jwt Token...
  55. try
  56. {
  57. var openIdConfigManager = new ConfigurationManager<OpenIdConnectConfiguration>(
  58. openIdConnectWellKnownConfigUri.ToString(),
  59. new OpenIdConnectConfigurationRetriever()
  60. );
  61. OpenIdConnectConfiguration openIdConfig = await openIdConfigManager.GetConfigurationAsync().ConfigureAwait(false);
  62. TokenValidationParameters validationParams = new TokenValidationParameters
  63. {
  64. ValidateIssuerSigningKey = true,
  65. ValidateAudience = true,
  66. ValidateIssuer = true,
  67. ValidateLifetime = false,
  68. ValidateTokenReplay = true,
  69. RequireExpirationTime = true,
  70. RequireAudience= true,
  71. RequireSignedTokens= true,
  72. //Valid values for Validation of the JWT...
  73. ValidAudience = configuration.GetValue<string>("Option:Audience"),
  74. ValidIssuer = openIdConfig.Issuer.Replace("{tenantid}", tenantId),
  75. //Set the Azure AD SigningKeys for Validation!
  76. IssuerSigningKeys = openIdConfig.SigningKeys,
  77. };
  78. var jwtTokenHandler = new JwtSecurityTokenHandler();
  79. jwtTokenHandler.ValidateToken(jwtTokenToValidate, validationParams, out SecurityToken validToken);
  80. return validToken as JwtSecurityToken
  81. ?? throw new SecurityTokenValidationException("Unexpected failure while parsing and validating the the JWT token specified.");
  82. }
  83. catch (Exception exc)
  84. {
  85. //Handle the Token Validation Exception (one of many types may occur)...
  86. return null;
  87. }
  88. }
  89. /// <summary>
  90. /// 驗證是否為公司Azure發行金鑰,支援大陸國際
  91. /// </summary>
  92. /// <param name="token"></param>
  93. /// <returns></returns>
  94. public static bool ValidateAccessToken(JwtSecurityToken token)
  95. {
  96. try
  97. {
  98. if (token.Payload.TryGetValue("tid", out var value) && value is string tokenTenantId)
  99. {
  100. return tenantids.Contains(tokenTenantId);
  101. }
  102. return false;
  103. }
  104. catch (Exception)
  105. {
  106. return false;
  107. }
  108. }
  109. #endregion
  110. private static async ValueTask<KeyVaultSecret> GetClientIDSecret(string clientID, string location)
  111. { //Azure 金鑰庫處理
  112. var s = await Task.Run(() =>
  113. {
  114. var secret = KeyVaultSecrets.GetOrAdd(clientID, (x) =>
  115. {
  116. try
  117. {
  118. var sts = Enum.Parse<CoreServiceClient>(location, true);
  119. var scrtetstring = sts.GetDescriptionText().Split(",");
  120. //TODO 之後驗證端點用KnownAuthorityHosts取代,此SDK版本無支援
  121. var secret = new ClientSecretCredential(scrtetstring[0], scrtetstring[1], scrtetstring[2], new TokenCredentialOptions() { AuthorityHost = new Uri(scrtetstring[3]) });
  122. var client = new SecretClient(new Uri(((KeyVaultEndpoint)sts).GetDescriptionText()), secret);
  123. var clientSecret = client.GetSecretAsync(clientID).ConfigureAwait(false);
  124. return clientSecret.GetAwaiter().GetResult();
  125. }
  126. catch
  127. {
  128. return null;
  129. }
  130. });
  131. return secret;
  132. });
  133. return s;
  134. }
  135. public static bool LifetimeValidator(DateTime? notBefore, DateTime? expires, SecurityToken securityToken, TokenValidationParameters validationParameters)
  136. {
  137. return true;
  138. //if (expires != null)
  139. //{
  140. // if (DateTime.UtcNow < expires)
  141. // {
  142. // return true;
  143. // }
  144. //}
  145. //return false;
  146. }
  147. private enum STSEndpoint
  148. {
  149. [Description("https://login.chinacloudapi.cn/4807e9cf-87b8-4174-aa5b-e76497d7392b")]
  150. China,
  151. [Description("https://login.microsoftonline.com/73a2bcc5-fe99-4566-aa8a-07e7bb287df1")]
  152. Global
  153. }
  154. private enum STSScope
  155. {
  156. [Description("api://72643704-b2e7-4b26-b881-bd5865e7a7a5/.default")]
  157. China,
  158. [Description("api://8768b06f-c5c5-4b0c-abfb-d7ded354626d/.default")]
  159. Global
  160. }
  161. private enum KeyVaultEndpoint
  162. {
  163. [Description("https://corekeyvaultcn.vault.azure.cn/")]
  164. China,
  165. [Description("https://corekeyvaultjp.vault.azure.net/")]
  166. Global
  167. }
  168. private enum CoreServiceClient
  169. {
  170. [Description("4807e9cf-87b8-4174-aa5b-e76497d7392b,72643704-b2e7-4b26-b881-bd5865e7a7a5,tRYbDXtotEOe2Bbmo=[3h9Hbu_Trt:c6,https://login.partner.microsoftonline.cn")]
  171. China,
  172. [Description("73a2bcc5-fe99-4566-aa8a-07e7bb287df1,8768b06f-c5c5-4b0c-abfb-d7ded354626d,7=O./yws0L89WcEsece:9/4deJHP4E=F,https://login.microsoftonline.com/")]
  173. Global
  174. }
  175. private enum STSJwtKeys
  176. {
  177. [Description("https://login.chinacloudapi.cn/4807e9cf-87b8-4174-aa5b-e76497d7392b/discovery/v2.0/keys")]
  178. China,
  179. [Description("https://login.microsoftonline.com/73a2bcc5-fe99-4566-aa8a-07e7bb287df1/discovery/v2.0/keys")]
  180. Global
  181. }
  182. private enum STSOpenidConfiguration {
  183. [Description("https://login.chinacloudapi.cn/4807e9cf-87b8-4174-aa5b-e76497d7392b/v2.0/.well-known/openid-configuration")]
  184. China,
  185. [Description("https://login.microsoftonline.com/73a2bcc5-fe99-4566-aa8a-07e7bb287df1/v2.0/.well-known/openid-configuration")]
  186. Global
  187. }
  188. public class MSADJwtKeys {
  189. public string kty { get;set; }
  190. public string use { get; set; }
  191. public string kid { get; set; }
  192. public string x5t { get; set; }
  193. public string n { get; set; }
  194. public string e { get; set; }
  195. public List<string> x5c { get; set; }
  196. public string issuer { get; set; }
  197. }
  198. }
  199. }