JWT
JSON WEB Token(JWT),是一种基于JSON的、用于在网络上声明某种主张的令牌(token)。JWT通常由三部分组成:头信息(header),消息体(payload)和签名(signature)。
.Net Core 中使用 JWT:
一、appsettings.json中增加相应配置
{
"JwtSettings": {
"Issuer": "https://localhost:44329",
"Audience": "https://localhost:44329",
"SecretKey": "1234567891qwerfdsawe"
}}
二、创建一个对应的类:
public class JwtSettings
{
public string Issuer { get; set; }
public string Audience { get; set; }
public string SecretKey { get; set; }
}
三、Startup类中配置
public class Startup
{
public IConfiguration Configuration { get; }
public Startup(IConfiguration configuration)
{
Configuration = configuration;
}
//1.ConfigureServices中添加服务
public void ConfigureServices(IServiceCollection services)
{
services.Configure<JwtSettings>(Configuration.GetSection("JwtSettings"));
var jwt = new JwtSettings();
Configuration.Bind("JwtSettings", jwt);//读取配置文件到C#实例
services.AddAuthentication(options =>
{
options.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
options.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
//options.DefaultScheme = JwtBearerDefaults.AuthenticationScheme;
}) //默认授权机制名称
.AddJwtBearer(options =>
{
options.TokenValidationParameters = new TokenValidationParameters
{
NameClaimType = JwtClaimTypes.Name,
RoleClaimType = JwtClaimTypes.Role,
ValidateIssuer = true,//是否在令牌期间验证签发者
ValidateAudience = true,//是否验证接收者
ValidateLifetime = true,//是否验证失效时间
ValidateIssuerSigningKey = true,//是否验证签名
ValidAudience = jwt.Audience,//接收者
ValidIssuer = jwt.Issuer,//签发者,签发的Token的人
IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(jwt.SecretKey))//拿到SHA256加密后的key
};
});
}
//2、Configure 中添加中间件
public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
{
if (env.IsDevelopment())
{
app.UseDeveloperExceptionPage();
}
app.UseHttpsRedirection();
app.UseRouting();
app.UseAuthentication();//JWT中间件
app.UseAuthorization();
app.UseEndpoints(endpoints =>
{
endpoints.MapControllers();
});
}
}
四、添加一个JWT认证的控制器AuthorizeController
using System;
using Microsoft.AspNetCore.Mvc;
using System.Security.Claims;
using Microsoft.IdentityModel.Tokens;
using Microsoft.Extensions.Options;
using System.Text;
using System.IdentityModel.Tokens.Jwt;
namespace WebApiTest.Controllers
{
[Route("api/jwt")]
public class AuthorizeController : Controller
{
private JwtSettings _jwtSettings;
public AuthorizeController(IOptions<JwtSettings> _jwtSettingsAccesser)
{
_jwtSettings = _jwtSettingsAccesser.Value;
}
[HttpGet]
[Route("gettoken")]
public IActionResult Token(string username,string pwd)
{
if (ModelState.IsValid)//判断是否合法
{
//登录验证,这里只是做了简单演示,具体还是要按自己的业务逻辑来判断
if (username != "Lucy" && pwd != "123456")//判断账号密码是否正确
{
return BadRequest();
}
//验证通过后,生成token
var claim = new Claim[]{
new Claim(ClaimTypes.Name,"Lucy"),
new Claim(ClaimTypes.Role,"admin")
};
//对称秘钥
var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_jwtSettings.SecretKey));
//签名证书(秘钥,加密算法)
var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
//生成token [注意]需要nuget添加Microsoft.AspNetCore.Authentication.JwtBearer包,并引用System.IdentityModel.Tokens.Jwt命名空间
var token = new JwtSecurityToken(_jwtSettings.Issuer, _jwtSettings.Audience, claim, DateTime.Now, DateTime.Now.AddMinutes(30), creds);
return Ok(new { token = new JwtSecurityTokenHandler().WriteToken(token) });
}
return BadRequest();
}
}
}
postman 测试得到token
五、控制器中使用jwt
在Controller /action 上打上特性 [Authorize]就可以了,不需要检查授权认证的话打上特性: [AllowAnonymous]
[Route("api/user")]
[ApiController]
[Authorize]//添加认证
public class UserController : Controller
{
[Route("Details")]
[HttpPost]
[AllowAnonymous]//不需要认证
public ActionResult<string> Details()
{
}
}