Tenduke.Client.WPF
4.0.1
See the version list below for details.
dotnet add package Tenduke.Client.WPF --version 4.0.1
NuGet\Install-Package Tenduke.Client.WPF -Version 4.0.1
<PackageReference Include="Tenduke.Client.WPF" Version="4.0.1" />
paket add Tenduke.Client.WPF --version 4.0.1
#r "nuget: Tenduke.Client.WPF, 4.0.1"
// Install Tenduke.Client.WPF as a Cake Addin #addin nuget:?package=Tenduke.Client.WPF&version=4.0.1 // Install Tenduke.Client.WPF as a Cake Tool #tool nuget:?package=Tenduke.Client.WPF&version=4.0.1
WPF client library for 10Duke Identity and Entitlement
Client library for .NET Windows Presentation Foundation (WPF) applications, for using services of the 10Duke Identity and Entitlement. Main features are:
- Authentication and authorization with OAuth 2.0 and OpenID Connect
- Querying user info
- Checking and consuming licenses
- Checking end-user permissions
- Releasing consumed licenses
Installation
The client library is available as a NuGet package. An example for installing the client library using NuGet Package Manager:
Installation with dotnet cli
dotnet add package Tenduke.Client.WPF
Installation with NuGet PackageManager
Install-Package Tenduke.Client.WPF
Basic usage
Class Tenduke.Client.WPF.EntClient
is the main implementation class
that supports integrating a WPF application to 10Duke Identity and
Entitlement service. Configuration and features of
Tenduke.Client.WPF.EntClient
are introduced below.
Authentication and authorization
When using 10Duke Identity, the client application delegates authentication to the 10Duke Identity Provider. For using 10Duke APIs, including Entitlement, the client application must authorize the API calls by presenting an OAuth 2.0 access token. The simplest way to achieve both authentication (and Single Sign-On) and authorization is to use OpenID Connect (OIDC). OpenID Connect is based on OAuth 2.0, and as a result of the sign-on flow both identity and authorization are established.
Authentication and authorization are implemented using OpenID Connect Authorization Code Grant flow with PKCE. An embedded browser is used for user interaction, most notably for the login prompt. This approach is secure, flexible and unleashes advanced use cases like federated authentication.
Embedded browser
The client library uses the CEFSharp library that is based on Chromium Embedded Framework. All the required components are bundled with the client library. CEFSharp must be initialized when the client application starts, before the browser window is opened for the first time, with the following method call:
var resolverArgs = Tenduke.Client.Desktop.Util.CefSharpUtil.AddAssemblyResolverForCefSharp();
This initialization call is a static call and must be called once in the
lifecycle of the client application. The returned resolverArgs
object
is needed later for initializing the Tenduke.Client.WPF.EntClient
.
Customizing the browser window
The browser window showing the embedded browser can be customized by
handling the RaiseInitializeBrowserWindow
event and setting window
properties in the event handler. This example changes the window title:
...
entClient.RaiseInitializeBrowserWindow += HandleInitializeBrowserWindow;
...
private void HandleInitializeBrowserWindow(object sender, InitializeBrowserWindowEventArgs e)
{
e.WebBrowserWindow.Title = "Acme login";
}
EntClient initialization and clean-up
After initializing the CEFSharp embedded browser component, the
Tenduke.Client.WPF.EntClient
can be initialized by calling:
Tenduke.Client.WPF.EntClient.Initialize(resolverArgs);
Here, resolverArgs
is the object returned by the CEFSharp
initialization call described above. Also this initialization call is a
static method call that must be done once in the client application
lifecycle.
After static initialization an instance of EntClient can be created:
var entClient = new EntClient() { OAuthConfig = myOAuthConfig };
Here, myOAuthConfig
is an instance of
Tenduke.Client.Config.AuthorizationCodeGrantConfig
, for instance:
var myOAuthConfig = new AuthorizationCodeGrantConfig()
{
AuthzUri = "https://my-test-idp.10duke.net/user/oauth20/authz",
TokenUri = "https://my-test-idp.10duke.net/user/oauth20/token",
UserInfoUri = "https://my-test-idp.10duke.net/user/info",
ClientID = "my-client-id",
ClientSecret = null,
RedirectUri = "oob:MyTestApplication",
Scope = "openid profile email",
SignerKey = [Public key of 10Duke Entitlement service],
ShowRememberMe = true,
UsePkce = true,
AllowInsecureCerts = false
};
Here, the Uris must point to an actual 10Duke Entitlement service
deployment. ClientID
, ClientSecret
(only used if UsePkce
is
false
) and RedirectUri
are standard OAuth parameters and they must
match values configured in the 10Duke Entitlement service deployment.
Scope
is the OAuth / OpenID Connect scope required by the client
application, usually at least the openid
and profile
scope should be
specified. SignerKey
is the RSA public key that is used for verifying
signatures of tokens issued by the 10Duke Entitlement service. The
following utility is provided for reading an RSA key from string, where
the string can be either an RSA public key in PEM format or URL of
server JWKS endpoint:
var publicKey = await Tenduke.Client.Util.CryptoUtil.ReadFirstRsaPublicKey(publicKeyOrJwksUrl, new HttpClient());
Now, the EntClient
instance is ready to be used for user
authentication, license requests etc.
When the client application is closing, the following call must be
executed to shut down EntClient
and clean up resources:
Tenduke.Client.WPF.EntClient.Shutdown();
This is a static method call to be called once in the client application lifecycle.
User authentication and OAuth authorization
User authentication is started with this call:
entClient.AuthorizeSync();
This starts the OAuth 2.0 / OpenID Connect flow and opens a modal window
with an embedded browser. User logs in in this window. What happens next
is fully handled by the client library: Internally a standard OAuth
redirect is executed to the specified redirect URI. Example redirect URI
oob:MyTestApplication
is used above, but any URI with a custom schema
can be used. By convention, the oob:
(Out Of Band) is used in most
cases.
When login is completed the modal window closes and the EntClient
instance holds the login state. The following call tells if the login
has been completed successfully:
var success = entClient.IsAuthorized();
Full OAuth authorization data included OpenID Connect ID Token is stored
in the Authorization
property:
var authorizationInfo = entClient.Authorization;
Using the client to make 10Duke API calls
Example user info and license requests are given below:
User info request
var userInfo = await entClient.UserInfoApi.GetUserInfoAsync();
This call returns an object with OpenID Connect user info.
Consume license
var tokenResponse = await entClient.AuthzApi.CheckOrConsumeAsync("MyLicense", true, ResponseType.JWT);
The call above returns a
Tenduke.Client.EntApi.Authz.AuthorizationDecision
object that
describes an authorization decision, returned as a signed JWT token.
The AuthorizationDecision
indicates if a license lease has been
granted (and a license seat has been taken), and the client application
can rely on the AuthorizationDecision
until the object expires.
Expiration of the object is the same as expiration of the returned JWT
token and expiration of the license lease.
var tokenResponse = await entClient.AuthzApi.CheckOrConsumeAsync(
"MyLicense",
true,
ResponseType.JWT,
ConsumptionMode.Cache,
new List<KeyValuePair<string, string>> { new KeyValuePair<string, string>("licenseId", licenseId) });
This example specifies some more parameters to the consumption request.
The last parameter shown in the example can be used for giving any
additional claims understood by the license consumption endpoint.
Standard additional claims include licenseId
and entitlementId
that
can be used for explicitly selecting the license or entitlement to
consume. In basic use cases for consuming if a valid license is found,
these parameters are not required.
License consumption requests compute a computer id that is sent with the
consumption requests in order to identify the client hardware. Computer
id can be customized by setting ComputerIdentityConfig
, for example
the following configuration makes computer id computation use
FIPS-compliant SHA256 hash algorithm:
entClient.ComputerIdentityConfig = new ComputerIdentityConfig() { HashAlg = Desktop.Util.ComputerIdentity.HashAlg.SHA256 };
Release license
var tokenResponse = await entClient.AuthzApi.ReleaseLicenseAsync(tokenResponse["jti"], ResponseType.JWT);
This call is used for returning a consumed lease (license seat) back to the license pool.
Links
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net8.0-windows7.0 is compatible. |
.NET Framework | net462 is compatible. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
-
.NETFramework 4.6.2
- CefSharp.Common (>= 126.2.70)
- CefSharp.Wpf (>= 126.2.70)
- chromiumembeddedframework.runtime.win-x64 (>= 126.2.7)
- chromiumembeddedframework.runtime.win-x86 (>= 126.2.7)
- Microsoft.AspNet.WebApi.Client (>= 6.0.0)
- Microsoft.AspNetCore.SystemWebAdapters (>= 1.4.0)
- System.IdentityModel.Tokens.Jwt (>= 7.6.3)
- System.Security.Permissions (>= 8.0.0)
- Tenduke.Client (>= 4.0.1)
- Tenduke.Client.Desktop (>= 4.0.1)
- Tenduke.Client.Winbase (>= 4.0.1)
-
net8.0-windows7.0
- CefSharp.Common.NetCore (>= 126.2.70)
- CefSharp.Wpf.NetCore (>= 126.2.70)
- chromiumembeddedframework.runtime.win-x64 (>= 126.2.7)
- chromiumembeddedframework.runtime.win-x86 (>= 126.2.7)
- Microsoft.AspNet.WebApi.Client (>= 6.0.0)
- Microsoft.AspNetCore.SystemWebAdapters (>= 1.4.0)
- System.IdentityModel.Tokens.Jwt (>= 7.6.3)
- System.Security.Permissions (>= 8.0.0)
- Tenduke.Client (>= 4.0.1)
- Tenduke.Client.Desktop (>= 4.0.1)
- Tenduke.Client.Winbase (>= 4.0.1)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
4.0.2 | 38 | 10/30/2024 |
4.0.1 | 126 | 7/16/2024 |
4.0.0 | 178 | 3/11/2024 |
3.6.0 | 162 | 9/20/2023 |
3.4.3 | 506 | 6/10/2022 |
3.4.2 | 473 | 2/14/2022 |
3.4.0 | 441 | 2/11/2022 |
3.3.1 | 294 | 1/3/2022 |
3.2.1 | 523 | 3/10/2021 |
3.1.1 | 479 | 11/30/2020 |
3.1.0 | 562 | 10/30/2020 |
3.0.0 | 595 | 4/2/2020 |
2.3.4 | 530 | 3/16/2020 |
2.3.3 | 543 | 3/12/2020 |
2.3.2 | 558 | 12/9/2019 |
2.3.1 | 567 | 12/5/2019 |
2.3.0 | 657 | 4/1/2019 |
2.2.2 | 611 | 3/19/2019 |
2.2.1 | 612 | 3/19/2019 |
2.2.0 | 684 | 2/14/2019 |
2.1.0 | 684 | 1/25/2019 |
2.0.3 | 683 | 1/21/2019 |
2.0.1.1 | 1,004 | 6/26/2018 |
2.0.0 | 850 | 6/26/2018 |