AspNet.Security.OAuth.Basecamp
9.0.0
dotnet add package AspNet.Security.OAuth.Basecamp --version 9.0.0
NuGet\Install-Package AspNet.Security.OAuth.Basecamp -Version 9.0.0
<PackageReference Include="AspNet.Security.OAuth.Basecamp" Version="9.0.0" />
paket add AspNet.Security.OAuth.Basecamp --version 9.0.0
#r "nuget: AspNet.Security.OAuth.Basecamp, 9.0.0"
// Install AspNet.Security.OAuth.Basecamp as a Cake Addin #addin nuget:?package=AspNet.Security.OAuth.Basecamp&version=9.0.0 // Install AspNet.Security.OAuth.Basecamp as a Cake Tool #tool nuget:?package=AspNet.Security.OAuth.Basecamp&version=9.0.0
AspNet.Security.OAuth.Providers
AspNet.Security.OAuth.Providers is a collection of security middleware that you can use in your ASP.NET Core application to support social authentication providers like GitHub, Twitter/X or Dropbox. It is directly inspired by Jerrie Pelser's initiative, Owin.Security.Providers.
The latest official release can be found on NuGet and the nightly builds on MyGet.
[!TIP] While the aspnet-contrib providers are still fully supported, developers are encouraged to use the OpenIddict client for new applications.
For information, see the Migrating to OpenIddict section.
Getting started
Adding social authentication to your application is a breeze and just requires a few lines in your Startup
class:
public void ConfigureServices(IServiceCollection services)
{
services.AddAuthentication(options => { /* Authentication options */ })
.AddGitHub(options =>
{
options.ClientId = "49e302895d8b09ea5656";
options.ClientSecret = "98f1bf028608901e9df91d64ee61536fe562064b";
});
}
public void Configure(IApplicationBuilder app)
{
app.UseAuthentication();
app.UseAuthorization();
}
See the /samples directory for a complete sample using ASP.NET Core MVC and supporting multiple social providers.
Contributing
AspNet.Security.OAuth.Providers is actively maintained by:
We would love it if you could help contributing to this repository.
Special thanks to our contributors:
- Aaron Sadler
- Abhinav Nigam
- Adam Reisinger
- Albert Zakiev
- Albireo
- Anders Blankholm
- Andrew Lock
- Andrew Mattie
- Andrii Chebukin
- Anthony Yates
- Chino Chang
- Chris Sung
- CoCo Lin
- Dave Timmins
- Dmitry Popov
- Drew Killion
- Elan Hasson
- Eric Green
- Ethan Celletti
- Floris Westerman
- Galo
- Gehongyan
- Igor Simovic
- James Holcomb
- Jason Loeffler
- Jerrie Pelser
- Jesse Mandel
- Jordan Knight
- Kévin Chalet
- Konstantin Mamaev
- LeaFrock
- Levi Muriuki
- Luke Fulliton
- Mariusz Zieliński
- Martin Costello
- Matthew Moore
- Maxime Roussin-Bélanger
- Michael Knowles
- Michael Tanczos
- Patrick Westerhoff
- Robert Shade
- saber-wang
- Sinan
- Stefan
- Steffen Wenz
- Tathagata Chakraborty
- TheUltimateC0der
- Tolbxela
- Tommy Parnell
- twsl
- wplong11
- Yannic Smeets
- zAfLu
- zhengchun
- Vicente Yu
- Volodymyr Baydalka
- Logan Dam
Security policy
Please see SECURITY.md for information about reporting security issues and bugs.
Support
Need help or wanna share your thoughts? Don't hesitate to join us on Gitter or ask your question on StackOverflow:
- Gitter: https://gitter.im/aspnet-contrib/AspNet.Security.OAuth.Providers
- StackOverflow: https://stackoverflow.com/questions/tagged/aspnet-contrib
License
This project is licensed under the Apache License. This means that you can use, modify and distribute it freely. See https://www.apache.org/licenses/LICENSE-2.0.html for more details.
Migrating to OpenIddict
The OpenIddict client and its 75+ web providers have significant advantages over the simpler OAuth 2.0-only authentication handler that is used by the aspnet-contrib providers:
- OpenIddict fully supports OpenID Connect, which allows enforcing additional security checks for providers that implement it.
- The OpenIddict client is stateful and provides built-in countermeasures against nonce/token replay attacks.
- While the aspnet-contrib providers only support the OAuth 2.0 code flow, the OpenIddict providers support additional flows, including the OpenID Connect hybrid flow, the OAuth 2.0 client credentials grant, the resource owner password credentials grant or the refresh token grant.
- The OpenIddict client supports OAuth 2.0 token introspection and OAuth 2.0 token revocation.
- OpenIddict uses OAuth 2.0 and OpenID Connect server configuration discovery to avoid hardcoding the endpoint URIs of a provider when possible, making the OpenIddict web providers more robust and more future-proof.
- While the aspnet-contrib providers require targeting the latest ASP.NET Core version, the OpenIddict web providers can be used in any supported version. They can also be used in ASP.NET 4.6.1+ websites and Windows/Linux desktop applications.
- OpenIddict uses
Microsoft.Extensions.Http.Polly
(orMicrosoft.Extensions.Http.Resilience
on .NET 8+) to make backchannel HTTP communications less prone to transient network errors.
For more information on how to get started with the OpenIddict web providers, you can read:
To contribute a new OpenIddict provider, visit Contributing a new Web provider.
Providers
Links to the latest stable and nightly NuGet packages for each provider, as well as a link to their integration documentation are listed in the table below.
Documentation for the providers' settings can be found here.
If a provider you're looking for does not exist, consider making a PR to add one.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net9.0 is compatible. |
-
net9.0
- No dependencies.
NuGet packages (1)
Showing the top 1 NuGet packages that depend on AspNet.Security.OAuth.Basecamp:
Package | Downloads |
---|---|
AuthScape.Services
Available soon |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
9.0.0 | 151 | 11/12/2024 |
8.3.0 | 89 | 11/7/2024 |
8.2.0 | 745 | 9/14/2024 |
8.1.0 | 1,040 | 6/14/2024 |
8.0.0 | 7,861 | 11/14/2023 |
7.0.4 | 1,905 | 8/15/2023 |
7.0.3 | 188 | 8/7/2023 |
7.0.2 | 939 | 4/16/2023 |
7.0.1 | 206 | 4/16/2023 |
7.0.0 | 2,804 | 11/7/2022 |
6.0.15 | 214 | 4/16/2023 |
6.0.14 | 351 | 11/2/2022 |
6.0.13 | 360 | 11/1/2022 |
6.0.12 | 403 | 10/10/2022 |
6.0.11 | 415 | 9/4/2022 |
6.0.10 | 435 | 8/31/2022 |
6.0.9 | 424 | 8/24/2022 |
6.0.8 | 433 | 8/19/2022 |
6.0.7 | 423 | 8/16/2022 |
6.0.6 | 471 | 4/20/2022 |
6.0.5 | 453 | 3/27/2022 |
6.0.4 | 480 | 2/10/2022 |
6.0.3 | 473 | 1/22/2022 |
6.0.2 | 301 | 1/6/2022 |
6.0.1 | 470 | 12/11/2021 |
6.0.0 | 2,125 | 11/8/2021 |
5.0.18 | 425 | 10/29/2021 |
5.0.17 | 425 | 10/26/2021 |
5.0.16 | 349 | 10/9/2021 |
5.0.15 | 364 | 10/4/2021 |
5.0.14 | 464 | 9/25/2021 |
5.0.13 | 357 | 9/24/2021 |
5.0.12 | 435 | 9/11/2021 |
5.0.11 | 380 | 8/24/2021 |
5.0.10 | 397 | 8/13/2021 |
5.0.9 | 429 | 7/28/2021 |
5.0.8 | 423 | 7/4/2021 |
5.0.7 | 502 | 6/20/2021 |
5.0.6 | 372 | 6/4/2021 |
5.0.5 | 406 | 6/3/2021 |
5.0.4 | 409 | 4/7/2021 |
5.0.3 | 401 | 3/26/2021 |
5.0.2 | 445 | 3/13/2021 |
5.0.1 | 401 | 2/1/2021 |
5.0.0 | 482 | 11/10/2020 |
3.1.8 | 431 | 8/31/2022 |
3.1.7 | 403 | 2/1/2021 |
3.1.6 | 479 | 10/26/2020 |
3.1.5 | 522 | 10/20/2020 |
3.1.4 | 491 | 10/6/2020 |
3.1.3 | 502 | 7/16/2020 |
3.1.2 | 568 | 7/8/2020 |
3.1.1 | 546 | 5/8/2020 |
3.1.0 | 518 | 4/20/2020 |