summaryrefslogtreecommitdiffstats
path: root/src/OpenID/OpenIdWebRingSsoRelyingParty/Login.aspx.cs
blob: 7f7f91e1320924c8741e475fc844ae193146a906 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
namespace OpenIdWebRingSsoRelyingParty {
	using System;
	using System.Collections.Generic;
	using System.Configuration;
	using System.Linq;
	using System.Web;
	using System.Web.Security;
	using System.Web.UI;
	using System.Web.UI.WebControls;
	using DotNetOpenAuth.OpenId;
	using DotNetOpenAuth.OpenId.Extensions.AttributeExchange;
	using DotNetOpenAuth.OpenId.RelyingParty;

	public partial class Login : System.Web.UI.Page {
		private const string RolesAttribute = "http://samples.dotnetopenauth.net/sso/roles";

		private static OpenIdRelyingParty relyingParty = new OpenIdRelyingParty();

		static Login() {
			// Configure the RP to only allow assertions from our trusted OP endpoint.
			relyingParty.EndpointFilter = ep => ep.Uri.AbsoluteUri == ConfigurationManager.AppSettings["SsoProviderOPEndpoint"];
		}

		protected void Page_Load(object sender, EventArgs e) {
			UriBuilder returnToBuilder = new UriBuilder(Request.Url);
			returnToBuilder.Path = "/login.aspx";
			returnToBuilder.Query = null;
			returnToBuilder.Fragment = null;
			Uri returnTo = returnToBuilder.Uri;
			returnToBuilder.Path = "/";
			Realm realm = returnToBuilder.Uri;

			var response = relyingParty.GetResponse();
			if (response == null) {
				if (Request.QueryString["ReturnUrl"] != null && User.Identity.IsAuthenticated) {
					// The user must have been directed here because he has insufficient
					// permissions to access something.
					this.MultiView1.ActiveViewIndex = 1;
				} else {
					// Because this is a sample of a controlled SSO environment,
					// we don't ask the user which Provider to use... we just send
					// them straight off to the one Provider we trust.
					var request = relyingParty.CreateRequest(
						ConfigurationManager.AppSettings["SsoProviderOPIdentifier"],
						realm,
						returnTo);
					var fetchRequest = new FetchRequest();
					fetchRequest.Attributes.AddOptional(RolesAttribute);
					request.AddExtension(fetchRequest);
					request.RedirectToProvider();
				}
			} else {
				switch (response.Status) {
					case AuthenticationStatus.Canceled:
						this.errorLabel.Text = "Login canceled.";
						break;
					case AuthenticationStatus.Failed:
						this.errorLabel.Text = HttpUtility.HtmlEncode(response.Exception.Message);
						break;
					case AuthenticationStatus.Authenticated:
						IList<string> roles = null;
						var fetchResponse = response.GetExtension<FetchResponse>();
						if (fetchResponse != null) {
							if (fetchResponse.Attributes.Contains(RolesAttribute)) {
								roles = fetchResponse.Attributes[RolesAttribute].Values;
							}
						}
						if (roles == null) {
							roles = new List<string>(0);
						}

						// Apply the roles to this auth ticket
						const int TimeoutInMinutes = 100; // TODO: look up the right value from the web.config file
						var ticket = new FormsAuthenticationTicket(
							2,
							response.ClaimedIdentifier,
							DateTime.Now,
							DateTime.Now.AddMinutes(TimeoutInMinutes),
							false, // non-persistent, since login is automatic and we wanted updated roles
							string.Join(";", roles.ToArray()));

						HttpCookie cookie = new HttpCookie(FormsAuthentication.FormsCookieName, FormsAuthentication.Encrypt(ticket));
						Response.SetCookie(cookie);
						Response.Redirect(Request.QueryString["ReturnUrl"] ?? FormsAuthentication.DefaultUrl);
						break;
					default:
						break;
				}
			}
		}

		protected void retryButton_Click(object sender, EventArgs e) {
			Response.Redirect("/login.aspx");
		}
	}
}