magic.lambda.ad-auth 14.0.12

There is a newer version of this package available.
See the version list below for details.
dotnet add package magic.lambda.ad-auth --version 14.0.12                
NuGet\Install-Package magic.lambda.ad-auth -Version 14.0.12                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="magic.lambda.ad-auth" Version="14.0.12" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add magic.lambda.ad-auth --version 14.0.12                
#r "nuget: magic.lambda.ad-auth, 14.0.12"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install magic.lambda.ad-auth as a Cake Addin
#addin nuget:?package=magic.lambda.ad-auth&version=14.0.12

// Install magic.lambda.ad-auth as a Cake Tool
#tool nuget:?package=magic.lambda.ad-auth&version=14.0.12                

Windows and LDAP authentication with Hyperlambda and Magic

This project gives your Magic installation the capability of authenticating users through your Windows Domain. The project contains two methods for authentication; One method where you supply your Windows username and password, and Magic checks these towards the DirectoryEntry object for your LDAP Domain. The other method is "automatic authentication" assuming you're already logged on to the domain with your client machine.

Notice - This project is not installed in your Magic server by default, but must be explicitly added by for instance referencing the magic.lambda.ad-auth package manually for then to build the "backend.csproj" file manually using e.g. the DotNet CLI.

Common configuration

Both of these methods implies that you configure Magic such that it knows your LDAP URL. This is done by changing the magic.auth.ldap value from your "appsettings.json" file, such that it points to your LDAP URL. Typically, your network administrator knows this value. Below is an example of this configuration. Make sure you change the LDAP://foo.acme.somewhere to your actual LDAP URL.

{
  "magic": {
    "auth": {
      "ldap": "LDAP://foo.acme.somewhere",

... keep the rest of the file as is.

Windows username/password authentication

Assuming you've applied the above configuration changes, you can authenticate such that the username and password the user supplies is passed into your Windows LDAP Domain to perform the actual authentication. Below is an example of using Windows username/password authentication.

auth.ad.authenticate
   username:foo@acme.com
   password:SomePa$$wordHere

If the authentication is successful, the above slot will return boolean true to caller. If the credentials are incorrect the slot will return false to caller.

Notice - The web server needs to be within your Windows domain for this to work. However, the client machine does not need to be a part of your Windows domain, which makes this solution suitable for applications exposed to the web, where you still want to use Windows SSO (Single Sign On) to allow for users to authenticate towards your Magic application.

Zero username/password Windows authentication

The second method assumes your client is already logged on to your domain with his Windows credentials, in addition to that you're accessing the application through your LAN, and that the web server is configured to use Windows authentication. This method allows you to invoke the [auth.ad.get-username] slot to retrieve the user's username, which you then later can use to authenticate the user in the Hyperlambda middleware. Below is an example of usage.

auth.ad.get-username

The above slot will return the Windows username of the user if successful. If not successful it will return null. Read more about Windows authentication to understand the internals of how this works.

To use this method, you'll have to change the magic.auth.auto-auth setting in your "appsettings.json" file, and set its value to "auth.ad.get-username". Below is an example of how to accomplish this, assuming you change the "LDAP://foo.acme.somewhere" value to the URL of your actual LDAP server.

{
  "magic": {
    "auth": {
      "ldap": "LDAP://foo.acme.somewhere",
      "auto-auth": "auth.ad.get-username",

... keep the rest of the file as is, unless you want to combine this with manual Windows authentication, which you can read about below.

Combining authentication mechanisms

Both of the above authentication mechanisms can actually be combined, such that the authenticate endpoint in Magic no longer requires the [username]/[password] arguments as mandatory, and if not given, it will try to automatically authenticate the user using the [auth.ad.get-username] slot.

If a [username]/[password] argument is provided though, it will try to authenticate the user using the [auth.ad.authenticate] slot. This allows the end user to explicitly login to Magic providing a username/password combination, which is useful for instance over a machine where the user is not logged into his Windows account, allowing the user to access Magic over the web - While automatically logging in the user if the user is on his intranet. The flow for this is simply to invoke the authenticate endpoint without a username/password combination first, and if this fails then ask the user for his username/password combination, and invoke the endpoint again, this time with the user's username and password as arguments to the invocation.

Getting started with Windows authentication

Before you can turn any of these features on, you'll have to somehow bring in the NuGet package into your project encapsulating this, which you can do by checking out the package's NuGet project page. Also notice that before you apply the above changes, you'll have to create a user in your Magic database with the same username you're using to sign on to your Windows domain. After you've created this user, you'll have to associate this user with the root role somehow, since after you've applied the above configurations you can no longer login using your default root account. Your Windows username is typically something resembling the following "acme\username", where acme is your Domain name.

Creating a user before you switch your configuration is crucial since this package only changes authentication, and not authorisation. This implies that you'll still need to use the default role assignment from Magic, which does a lookup into the "magic/roles" database table - And in order to associate a user with roles, you'll need an actual username to associate the user with these role(s). However, the passwords of your users as you create these are irrelevant, since the default password logic of Magic is never applied once you've configured your Magic application to function according to the above recipe.

This allows you to still apply (most) of the default auth parts to your users, such as locking them out, imprison them, impersonate them, etc - See the video documentation for the "Auth" menu item to understand what this implies. The one thing that will not work though is the ability send a user a "forgot password link", etc for obvious reasons - Since Magic no longer is responsible for maintaining your users' passwords, but rather your Windows Domain now controls your users passwords, etc.

Project website

The source code for this repository can be found at github.com/polterguy/magic.lambda.ad-auth, and you can provide feedback, provide bug reports, etc at the same place.

Quality gates

  • Build status
  • Quality Gate Status
  • Bugs
  • Code Smells
  • Coverage
  • Duplicated Lines (%)
  • Lines of Code
  • Maintainability Rating
  • Reliability Rating
  • Security Rating
  • Technical Debt
  • Vulnerabilities
Product Compatible and additional computed target framework versions.
.NET net6.0 is compatible.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
15.1.0 314 12/28/2022
14.5.7 318 12/13/2022
14.5.5 321 12/6/2022
14.5.1 349 11/23/2022
14.5.0 340 11/18/2022
14.4.5 414 10/22/2022
14.4.1 419 10/22/2022
14.4.0 426 10/17/2022
14.3.1 417 9/12/2022
14.3.0 395 9/10/2022
14.1.3 415 8/7/2022
14.1.2 403 8/7/2022
14.1.1 412 8/7/2022
14.0.14 439 7/26/2022
14.0.12 406 7/24/2022
14.0.11 427 7/23/2022
14.0.10 430 7/23/2022
14.0.9 421 7/23/2022
14.0.8 473 7/17/2022
14.0.5 443 7/11/2022
14.0.4 437 7/7/2022
14.0.3 444 7/2/2022
14.0.2 437 7/2/2022
14.0.0 425 6/25/2022
13.4.0 459 5/31/2022
13.3.4 454 5/9/2022
13.3.0 450 5/1/2022
13.2.0 471 4/21/2022
13.1.0 459 4/7/2022
13.0.0 436 4/5/2022
11.0.5 458 3/2/2022
11.0.4 445 2/22/2022
11.0.3 452 2/9/2022
11.0.2 458 2/6/2022
11.0.1 478 2/5/2022
10.0.21 474 1/28/2022
10.0.20 461 1/27/2022
10.0.19 447 1/23/2022
10.0.18 433 1/17/2022
10.0.15 298 12/31/2021
10.0.14 279 12/28/2021
10.0.7 273 12/22/2021
10.0.5 308 12/18/2021
9.9.9 962 11/29/2021
9.9.3 365 11/9/2021
9.8.0 356 10/20/2021
9.7.9 384 10/19/2021
9.7.5 360 10/14/2021
9.7.0 396 10/9/2021
9.6.6 375 8/14/2021
9.3.3 375 6/16/2021
9.3.1 359 6/14/2021
9.2.7 426 6/8/2021
9.2.6 392 6/7/2021