JwtAuthExtension.cs 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. using IdentityModel;
  2. using Microsoft.AspNetCore.Authentication.JwtBearer;
  3. using Microsoft.AspNetCore.Authorization;
  4. using Microsoft.Extensions.Configuration;
  5. using Microsoft.Extensions.DependencyInjection;
  6. using Microsoft.IdentityModel.Tokens;
  7. using System;
  8. using System.Threading.Tasks;
  9. using System.Security.Claims;
  10. using System.IdentityModel.Tokens.Jwt;
  11. using System.Collections.Generic;
  12. using System.Text;
  13. namespace TEAMModelOS.SDK.Extension
  14. {
  15. public static class JwtAuthExtension
  16. {
  17. public static string CreateAuthToken(string issuer, string userID, string salt, string schoolID = "", string[] roles = null, string[] permissions = null, int expire = 1)
  18. {
  19. // 設定要加入到 JWT Token 中的聲明資訊(Claims)
  20. var claims = new List<Claim>();
  21. // 在 RFC 7519 規格中(Section#4),總共定義了 7 個預設的 Claims
  22. claims.Add(new Claim(JwtRegisteredClaimNames.Iss, issuer)); //發行者
  23. claims.Add(new Claim(JwtRegisteredClaimNames.Sub, userID)); // 用戶ID
  24. claims.Add(new Claim(JwtRegisteredClaimNames.Azp, schoolID)); // 學校簡碼,如果有的話
  25. claims.Add(new Claim(JwtRegisteredClaimNames.Exp, DateTimeOffset.UtcNow.AddHours(expire).ToUnixTimeSeconds().ToString())); // 到期的時間,必須為數字
  26. // 擴充 "roles" 加入登入者的角色,角色類型 (USER、HABOOK)
  27. if (roles != null)
  28. {
  29. foreach (var role in roles)
  30. {
  31. claims.Add(new Claim("roles", role));
  32. }
  33. }
  34. // 擴充 "permissions" 加入登入者的權限請求
  35. if (permissions != null)
  36. {
  37. foreach (var role in permissions)
  38. {
  39. claims.Add(new Claim("permissions", role));
  40. }
  41. }
  42. // 建立一組對稱式加密的金鑰,主要用於 JWT 簽章之用
  43. var securityKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(salt));
  44. // HmacSha256 有要求必須要大於 128 bits,所以 salt 不能太短,至少要 16 字元以上
  45. // https://stackoverflow.com/questions/47279947/idx10603-the-algorithm-hs256-requires-the-securitykey-keysize-to-be-greater
  46. var signingCredentials = new SigningCredentials(securityKey, SecurityAlgorithms.HmacSha256Signature);
  47. // 建立 SecurityTokenDescriptor
  48. var tokenDescriptor = new SecurityTokenDescriptor
  49. {
  50. Issuer = issuer,
  51. Subject = new ClaimsIdentity(claims),
  52. Expires = DateTime.Now.AddHours(expire),
  53. SigningCredentials = signingCredentials
  54. };
  55. // 產出所需要的 JWT securityToken 物件,並取得序列化後的 Token 結果(字串格式)
  56. var tokenHandler = new JwtSecurityTokenHandler();
  57. var securityToken = tokenHandler.CreateToken(tokenDescriptor);
  58. var serializeToken = tokenHandler.WriteToken(securityToken);
  59. return serializeToken;
  60. }
  61. public static bool ValidateAuthToken(string token, string salt)
  62. {
  63. try
  64. {
  65. var handler = new JwtSecurityTokenHandler();
  66. var validationParameters = new TokenValidationParameters
  67. {
  68. RequireExpirationTime = true,
  69. ValidateIssuer = false,
  70. ValidateAudience = false,
  71. IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(salt)),
  72. ValidateLifetime = false,
  73. //LifetimeValidator = LifetimeValidator,
  74. ClockSkew = TimeSpan.Zero
  75. };
  76. ClaimsPrincipal principal = handler.ValidateToken(token, validationParameters, out SecurityToken securityToken);
  77. return true;
  78. }
  79. catch (Exception ex)
  80. {
  81. //Trace.WriteLine(ex.Message);
  82. return false;
  83. }
  84. }
  85. }
  86. }