JwtAuthExtension.cs 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. using IdentityModel;
  2. using Microsoft.AspNetCore.Authentication.JwtBearer;
  3. using Microsoft.AspNetCore.Authorization;
  4. using Microsoft.Extensions.Configuration;
  5. using Microsoft.Extensions.DependencyInjection;
  6. using Microsoft.IdentityModel.Tokens;
  7. using System;
  8. using System.Threading.Tasks;
  9. using System.Security.Claims;
  10. using System.IdentityModel.Tokens.Jwt;
  11. using System.Collections.Generic;
  12. using System.Text;
  13. namespace TEAMModelOS.SDK.Extension
  14. {
  15. public static class JwtAuthExtension
  16. {
  17. public static string CreateAuthToken(string issuer, string userID, string salt, string schoolID = "", string[] roles = null, string[] permissions = null, int expire = 1)
  18. {
  19. // 設定要加入到 JWT Token 中的聲明資訊(Claims)
  20. var claims = new List<Claim>();
  21. // 在 RFC 7519 規格中(Section#4),總共定義了 7 個預設的 Claims
  22. claims.Add(new Claim(JwtRegisteredClaimNames.Iss, issuer)); //發行者
  23. claims.Add(new Claim(JwtRegisteredClaimNames.Sub, userID)); // 用戶ID
  24. claims.Add(new Claim(JwtRegisteredClaimNames.Azp, schoolID)); // 學校簡碼,如果有的話
  25. claims.Add(new Claim(JwtRegisteredClaimNames.Exp, DateTimeOffset.UtcNow.AddHours(expire).ToUnixTimeSeconds().ToString())); // 到期的時間,必須為數字
  26. // 擴充 "roles" 加入登入者的角色,角色類型 (USER、HABOOK)
  27. foreach (var role in roles)
  28. {
  29. claims.Add(new Claim("roles", role));
  30. }
  31. // 擴充 "permissions" 加入登入者的權限請求
  32. foreach (var role in permissions)
  33. {
  34. claims.Add(new Claim("permissions", role));
  35. }
  36. // 建立一組對稱式加密的金鑰,主要用於 JWT 簽章之用
  37. var securityKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(salt));
  38. // HmacSha256 有要求必須要大於 128 bits,所以 salt 不能太短,至少要 16 字元以上
  39. // https://stackoverflow.com/questions/47279947/idx10603-the-algorithm-hs256-requires-the-securitykey-keysize-to-be-greater
  40. var signingCredentials = new SigningCredentials(securityKey, SecurityAlgorithms.HmacSha256Signature);
  41. // 建立 SecurityTokenDescriptor
  42. var tokenDescriptor = new SecurityTokenDescriptor
  43. {
  44. Issuer = issuer,
  45. Subject = new ClaimsIdentity(claims),
  46. Expires = DateTime.Now.AddHours(expire),
  47. SigningCredentials = signingCredentials
  48. };
  49. // 產出所需要的 JWT securityToken 物件,並取得序列化後的 Token 結果(字串格式)
  50. var tokenHandler = new JwtSecurityTokenHandler();
  51. var securityToken = tokenHandler.CreateToken(tokenDescriptor);
  52. var serializeToken = tokenHandler.WriteToken(securityToken);
  53. return serializeToken;
  54. }
  55. public static bool ValidateAuthToken(string token, string salt)
  56. {
  57. try
  58. {
  59. var handler = new JwtSecurityTokenHandler();
  60. var validationParameters = new TokenValidationParameters
  61. {
  62. RequireExpirationTime = true,
  63. ValidateIssuer = false,
  64. ValidateAudience = false,
  65. IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(salt)),
  66. ValidateLifetime = false,
  67. //LifetimeValidator = LifetimeValidator,
  68. ClockSkew = TimeSpan.Zero
  69. };
  70. ClaimsPrincipal principal = handler.ValidateToken(token, validationParameters, out SecurityToken securityToken);
  71. return true;
  72. }
  73. catch (Exception ex)
  74. {
  75. //Trace.WriteLine(ex.Message);
  76. return false;
  77. }
  78. }
  79. }
  80. }