I want to integrate two-factor authentication or Multi-factor authentication for my.net 3.5 legacy web application.
Is there any support service or technique to do this?
Can I use any of the below services?
Windows azure active directory authentication
Google Authentication
Okta verification
Microsoft Authenticator
Related
Is it possible to support integrated windows authentication (Kerberos) in a self hosted web api or is IIS an absolute requirement if integrated window authentication is required ?
Googling around I did not find a clear answer to this question or any sample code that demonstrates how this can be achieved.
I am trying to build self hosted web api that client can authenticate with using windows authentication ( without need to enter username password)
I have a C# MVC application which requires ADFS authentication. ADFS was not considered at the initial stage of the development until completion of the application. Any ideas on how to make the application aware of ADFS? I have configured ADFS with the right claims, the challenge is making the application aware. Any idea is appreciated. I am using ADFS 2.0. It is On-Premise ADFS
Making the application "ADFS aware" requires that the application uses one of the supported protocols i.e. WS-Fed, SAML or OpenID Connect.
Adding WIF (WS-Fed) is a good option.
Building My First Claims-Aware ASP.NET Web Application
Deploying Active Directory Federation Services in Azure
Use the On-Premises Organizational Authentication Option (ADFS) With ASP.NET
in Visual Studio 2013
Using ADFS with Azure for Single Sign-On
in ASP.NET MVC
We currently have an Asp .Net web application (Framework 4.5) using Forms based authentication. A few of our clients are asking for integration with their applications and does not want to have separate login accounts.
What would be the best way to implement this? The solution should be able to validate against different identity providers.
A consultant has suggested to convert the current web app to be claims-aware but not sure how to proceed with it or where to start .
Thanks for all your help.
Making an application claims-aware implies adding support for one of:
WS-Federation
SAML 2.0
OpenID Connect / OAuth
This then enables the application to talk to an IDP for SSO e.g. ADFS, Azure AD, identityserver, Auth0.
In the Microsoft world, web apps use the OWIN NuGet packages for WS-Fed (WIF) or OIDC. For SAML, look here.
Desktop apps use ADAL or the later version MSAL.
ADFS e.g. only authenticates against AD. If you want to authenticate against a DB as well, you federate ADFS with e.g. identityserver or Auth0 both of which have that ability.
My C# .net 4.5 asp.net app currently uses forms authentication. We need to implement SSO on it via an on-premises ADFS 3.0 server that will link to external ADFS servers using Claims Provider Trusts.
The thing is that some users will continue logging in the old Forms Auth way while others will be authenticating using their ADFS credentials.
Can ADFS and Forms Auth be mixed? How can I direct the different users to the different logins?
I read here that I might need to code my own Custom Auth Provider...this seems pretty complicated. Is there another simpler way?
I currently have a web app in ASP.NET MVC using ASP.NET Identity for authentication (user/password).
Now i want to shift the authentication to an external service. this external service only returns the username (indicating that is authenticated).
How can i tell my web app (and to ASP.NET Identity) that the user is logged in without logging it again?
Thanks!
Visual Studio 2013 and ASP.NET 4.5.1 make integration with external authentication services easier for developers by providing built-in integration for the authentication services such as Facebook, Google, Microsoft Accounts and Twitter. Otherwise your web application can enable users to log in using OAuth 2.0 with credentials from an external authentication.