Authagonal.Protocol
0.2.1
See the version list below for details.
dotnet add package Authagonal.Protocol --version 0.2.1
NuGet\Install-Package Authagonal.Protocol -Version 0.2.1
<PackageReference Include="Authagonal.Protocol" Version="0.2.1" />
<PackageVersion Include="Authagonal.Protocol" Version="0.2.1" />
<PackageReference Include="Authagonal.Protocol" />
paket add Authagonal.Protocol --version 0.2.1
#r "nuget: Authagonal.Protocol, 0.2.1"
#:package Authagonal.Protocol@0.2.1
#addin nuget:?package=Authagonal.Protocol&version=0.2.1
#tool nuget:?package=Authagonal.Protocol&version=0.2.1
Authagonal.Protocol
Embeddable OIDC / OAuth 2.0 protocol surface extracted from Authagonal.Server.
Provides /connect/authorize, /connect/token, /connect/userinfo, /connect/par (RFC 9126 Pushed Authorization Requests), /.well-known/openid-configuration, and JWKS endpoints plus the token minting pipeline — nothing else. No user store, no SAML, no admin UI, no login pages.
Plug in your own identity via IOidcSubjectResolver and storage via IClientStore / IGrantStore / IScopeStore / ISigningKeyStore. Use this when you need to expose OIDC from an app that already has its own identity (e.g. share-link grants, service-to-service auth).
Quick start
dotnet add package Authagonal.Protocol
builder.Services.AddAuthagonalProtocol(opts =>
{
opts.AuthenticationScheme = "Cookies"; // or your custom scheme
opts.Clients.Add(new OidcClientDescriptor
{
ClientId = "my-rp",
RedirectUris = { "https://rp.example.com/callback" },
AllowedScopes = { "openid", "profile", "email" },
});
});
builder.Services.AddScoped<IOidcSubjectResolver, MySubjectResolver>();
builder.Services.AddSingleton<IClientStore, MyClientStore>();
// ... IGrantStore, IScopeStore, ISigningKeyStore, ITenantContext
app.MapAuthagonalProtocolEndpoints();
Federation passthrough
OidcSubject.FederationClaims carries per-session claims received from an upstream IdP through to issued tokens, gated by the same scope-driven UserClaims whitelist as CustomAttributes. Federation values win on key collision and survive refresh rotations distinct from the per-user record.
Packages
| Package | Description |
|---|---|
| Authagonal.Core | Core models, interfaces, and abstractions |
| Authagonal.Protocol | Embeddable OIDC/OAuth 2.0 protocol surface |
| Authagonal.Storage | Azure Table Storage backend |
| Authagonal.Server | Full auth server — endpoints, middleware, services, login UI |
Links
| Product | Versions Compatible and additional computed target framework versions. |
|---|---|
| .NET | net9.0 is compatible. net9.0-android was computed. net9.0-browser was computed. net9.0-ios was computed. net9.0-maccatalyst was computed. net9.0-macos was computed. net9.0-tvos was computed. net9.0-windows was computed. net10.0 is compatible. net10.0-android was computed. net10.0-browser was computed. net10.0-ios was computed. net10.0-maccatalyst was computed. net10.0-macos was computed. net10.0-tvos was computed. net10.0-windows was computed. |
-
net10.0
- Authagonal.Core (>= 0.2.1)
- BCrypt.Net-Next (>= 4.1.0)
- Microsoft.AspNetCore.Authentication.JwtBearer (>= 10.0.5)
- Microsoft.IdentityModel.JsonWebTokens (>= 8.17.0)
- Microsoft.IdentityModel.Tokens (>= 8.17.0)
-
net9.0
- Authagonal.Core (>= 0.2.1)
- BCrypt.Net-Next (>= 4.1.0)
- Microsoft.AspNetCore.Authentication.JwtBearer (>= 9.0.0)
- Microsoft.IdentityModel.JsonWebTokens (>= 8.17.0)
- Microsoft.IdentityModel.Tokens (>= 8.17.0)
NuGet packages (1)
Showing the top 1 NuGet packages that depend on Authagonal.Protocol:
| Package | Downloads |
|---|---|
|
Authagonal.Server
Drop-in authentication server for ASP.NET Core. OAuth 2.0, OIDC, SAML SSO, and admin APIs. |
GitHub repositories
This package is not used by any popular GitHub repositories.