Rownd 1.2.0
See the version list below for details.
dotnet add package Rownd --version 1.2.0
NuGet\Install-Package Rownd -Version 1.2.0
<PackageReference Include="Rownd" Version="1.2.0" />
paket add Rownd --version 1.2.0
#r "nuget: Rownd, 1.2.0"
// Install Rownd as a Cake Addin #addin nuget:?package=Rownd&version=1.2.0 // Install Rownd as a Cake Tool #tool nuget:?package=Rownd&version=1.2.0
Rownd bindings for .NET Core
Use this library to integrate Rownd into your .NET Core web application.
Convenience wrappers are provided for the .NET Core Identity framework, but you can also leverage token validation and
Installation
From NuGet:
dotnet add package Rownd
Supported versions
- .NET 6.x
- Need a different version? Let us know!
Usage
Prepare configuration values
The Rownd client requires an application key (which is publishable) and an application secret (which should be kept private). If you don't have these values, you can obtain them at https://app.rownd.io.
Once you have them, you can add them to your appsettings.json
:
{
...
"Rownd": {
"AppKey": "...",
"AppSecret": "..."
}
}
Or you can set environment variables and the library will use them automatically (recommended):
export ROWND_APP_KEY="..."
export ROWND_APP_SECRET="..."
Inject Rownd into your application
To get set up quickly, we'll assume you added the app key and secret to your appsettings.json
file as shown above.
Next, add the following to your Program.cs
file before the builder.build()
statement:
using Rownd;
...
builder.Services.AddSingleton<Rownd.Models.Config>(sp => {
return new Rownd.Models.Config(builder.Configuration["Rownd:AppKey"], builder.Configuration["Rownd:AppSecret"]);
});
builder.Services.AddSingleton<RowndClient>();
At this point, your server should accept Rownd JWTs and validate them. If you're building a Single Page Application (SPA), you'll want to leverage our framework-specific browser SDKs for ease of implementation.
If you're building a more traditional web application, keep reading...
Use Rownd with .NET Core Identity cookie-based sessions
If you're adding Rownd to an existing application or building a new one that uses the default, cookie-based session handling that comes with .NET Core Identity, you'll need to add an additional controller to your app that will accept a Rownd JWT and set a session cookie in response.
Add a new controller that looks like this:
using Microsoft.AspNetCore.Identity;
using Microsoft.AspNetCore.Mvc;
using Rownd;
using Rownd.Helpers;
namespace MyAppNamespace.Controllers
{
[Route("/api/auth/rownd")]
public class RowndAuthController : RowndCookieExchange
{
// OPTIONAL
protected override async Task IsAllowedToSignIn(RowndUser rowndUser, Dictionary<string, dynamic> signInContext) {
// Run any custom logic here to ensure this user should be allowed to sign in.
// Use `signInContext` to store data you may want to use in a later phase (e.g. OnSignInSuccess())
// return; // if everything is fine
// throw new Exception("You aren't allowed here!"); // if you want to prevent the user from signing in
}
protected virtual async Task OnSuccessfulSignIn(RowndUser? rowndUser, IdentityUser? user, Dictionary<string, dynamic> signInContext) {
// Run any custom logic here after a successful sign in.
// Use `signInContext` to access data you stored during IsAllowedToSignIn()
// IdentityUser `user` may be null if the user was not found in the database or if a `UserManager` instance was not provided.
}
public RowndAuthController(RowndClient client, ILogger<RowndAuthController> logger, UserManager<IdentityUser> userManager) : base(client, logger)
{
_userManager = userManager; // If provided, Rownd will attempt to match the incoming user with an existing user in the database.
_addNewUsersToDatabase = true; // If you want Rownd to add new users to the database when they're first authenticated, set this to `true` (requires `_userManager`)
_defaultAuthenticationScheme = IdentityConstants.ApplicationScheme; // Sets the authentication scheme (default: `IdentityConstants.ApplicationScheme`)
_signOutRedirectUrl = "/"; // Where to redirect the user after signing out (default: "/")
}
}
}
Let's examine what's happening in the above code:
We're using the
RowndCookieExchange
base class to handle the exchange of Rownd JWTs for a session cookie. It will accept a Rownd JWT in the POST body, call theHttpContext.SignInAsync()
method with the user's email address and/or phone number and a role (if present).We're attaching a route to the controller (the base class is an abstract
ApiController
) that we'll use later to handle the exchange of Rownd JWTs for a session cookie. You can specify any route you like here, but/api/auth/rownd
is a decent choice.Using .NET dependency injection (DI), the server injects references to the RowndClient and an ILogger (which are required). If you want Rownd to add users to your database, then you'll also need to accept a reference to a
UserManager
instance._addNewUsersToDatabase
is a base class instance variable and is set tofalse
by default. If you want Rownd to add users to your database, you'll need to set this totrue
. Likewise,_userManager
is a base class instance variable and is set tonull
by default. Be sure to populate this with the UserManager injected dependency if_addNewUsersToDatabase
istrue
.Optionally, we can override the async, virtual method
IsAllowedToSignIn()
to run custom logic identifying whether the current user should be able to establish an authenticated session. This might mean checking a prerequisite in another system or simply checking an attribute on the user's Rownd profile. If this method throws an exception, the sign-in process will stop before the session is established and a 403 Forbidden response will be returned. The body will contain amessage
property with the exception message.
Finally, we need to install the Rownd Hub and instruct it to call our controller API when the page loads.
Follow these instructions to install the Rownd Hub. You'll want to ensure it runs on every page of your application, so be sure to add it as a common script or drop it directly into your layout.
Add the following script just below the Rownd Hub script to handle :
_rphConfig.push(['setPostAuthenticationApi', { method: 'post', url: '/api/auth/rownd' // Replace this with the route you specified in the controller }]); _rphConfig.push(['setPostSignOutApi', { method: 'delete', url: '/api/auth/rownd' // Replace this with the route you specified in the controller }]);
That's it! At this point, you should be able to fire up your app in a browser, sign in with Rownd, and navigate around your app.
If you run into issues, please let us know!
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net6.0
- IdentityModel (>= 6.0.0)
- Microsoft.AspNetCore.Authentication.OpenIdConnect (>= 6.0.3)
- Microsoft.IdentityModel.Protocols.OpenIdConnect (>= 6.16.0)
- ScottBrady.IdentityModel (>= 1.4.0)
- System.IdentityModel.Tokens.Jwt (>= 6.16.0)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.