IdentityServer4-缺少子声明 [英] IdentityServer4 - sub claim is missing
问题描述
我有一个IdentityServer4实例,试图在nginx代理后面的Docker容器中运行.我已经基于Git存储库中的AspNet身份示例进行了构建,但是在用户成功注册了一个新帐户之后,我从IdentityServer中看到发生错误",并且日志显示了
I've got an IdentityServer4 instance that I'm trying to get running in a Docker container behind an nginx proxy. I've based it on the AspNet identity sample from the Git repo, but after a user successfully registers a new account I get "An error occurred" from IdentityServer and the logs show
[07:46:39 ERR] An unhandled exception has occurred: sub claim is missing
System.InvalidOperationException: sub claim is missing
at IdentityServer4.IdentityServerPrincipal.AssertRequiredClaims(ClaimsPrincipal principal
at IdentityServer4.Hosting.IdentityServerAuthenticationService.AugmentPrincipal(ClaimsPrincipal principal
at IdentityServer4.Hosting.IdentityServerAuthenticationService.<SignInAsync>d__7.MoveNext
[07:46:39 ERR] An unhandled exception has occurred: sub claim is missing
System.InvalidOperationException: sub claim is missing
at IdentityServer4.IdentityServerPrincipal.AssertRequiredClaims(ClaimsPrincipal principal
at IdentityServer4.Hosting.IdentityServerAuthenticationService.AugmentPrincipal(ClaimsPrincipal principal
at IdentityServer4.Hosting.IdentityServerAuthenticationService.<SignInAsync>d__7.MoveNext
我的Startup.cs看起来像这样
My Startup.cs looks like this
var migrationsAssembly = typeof(Startup).GetTypeInfo().Assembly.GetName().
var connectionString = Configuration.GetConnectionString("DefaultConnection");
var issuerUri = Configuration.GetSection("IssuerUri").Value;
services.AddDbContext<ApplicationDbContext>(options =>
options.UseSqlServer(connectionString));
services.AddIdentity<ApplicationUser, IdentityRole>()
.AddEntityFrameworkStores<ApplicationDbContext>()
.AddDefaultTokenProviders();
services.AddTransient<IEmailSender, EmailSender>();
services.AddMvc();
services.AddCors(o => o.AddPolicy("CorsPolicy", b =>
{
b.AllowAnyOrigin()
.AllowAnyMethod()
.AllowAnyHeader();
}));
services.AddIdentityServer(options =>
{
options.IssuerUri = issuerUri;
options.PublicOrigin = issuerUri;
})
.AddDeveloperSigningCredential()
// this adds the config data from DB (clients, resources)
.AddConfigurationStore(options =>
{
options.ConfigureDbContext = builder =>
builder.UseSqlServer(connectionString,
sql => sql.MigrationsAssembly(migrationsAssembly));
})
// this adds the operational data from DB (codes, tokens, consents)
.AddOperationalStore(options =>
{
options.ConfigureDbContext = builder =>
builder.UseSqlServer(connectionString,
sql => sql.MigrationsAssembly(migrationsAssembly));
// this enables automatic token cleanup. this is optional.
//options.EnableTokenCleanup = true;
//options.TokenCleanupInterval = 30;
});
我肯定错过了一些明显的配置,但看不到哪里.有什么想法吗?
I must have missed some obvious config but I can't see where. Any ideas?
更新 我已经在此方面取得了一些进展,并且似乎已经超过了最初的错误.用户现在已通过身份验证,但signin-oidc页面会引发错误
UPDATE I've made some progress with this and seemed to have got past the initial error. The user is now authenticated but the signin-oidc page throws the error
[11:33:21 INF] Request starting HTTP/1.1 POST http://mvcportal.co.uk/signin-oidc application/x-www-form-urlencoded 1565
[11:33:21 INF] AuthenticationScheme: Cookies signed in.
[11:33:21 INF] Request finished in 684.8425ms 302
[11:33:27 INF] Request starting HTTP/1.1 POST http://mvcportal.co.uk/signin-oidc application/x-www-form-urlencoded 1565
[11:33:27 ERR] Message contains error: 'invalid_grant', error_description: 'error_description is null', error_uri: 'error_uri is null', status code '400'.
我有一个有效的JWT,但我注意到idp不等于发行者.正确吗?
I've got a valid JWT but I notice the idp is not equal to the issuer. Is that correct?
{
"nbf": 1508758474,
"exp": 1508758774,
"iss": "http://myproxiedlogonsitebehindnginx.co.uk",
"aud": "mvc.portal",
"nonce": "636443552746808541.MGVjMzk2NTEtYmYwNS00NmQwLTllOTQtZDVjNjdlYTA2YWVlYTQ3Zjg1NjgtZDA1Yi00NDE0LWJiYmYtMjM4YzI1NjZlYTcx",
"iat": 1508758474,
"c_hash": "kG7wG8vSgRe5zdriHQ6iMA",
"sid": "c9410ee8f27b69c32e43d5ac3d407f37",
"sub": "e80fb854-cab2-4381-8057-19de0fea73f4",
"auth_time": 1508757008,
"idp": "local",
"amr": [
"pwd"
]
}
更新2 这是idsrv上的客户端配置(如果有帮助的话)
UPDATE 2 This is the client configuration on idsrv if that helps
new Client
{
ClientId = "mvc.portal",
ClientName = "Customer Portal",
ClientUri = customerPortalBaseUri,
ClientSecrets =
{
new Secret("21f51463-f436-4a84-92ce-1b520dd63a81".Sha256())
},
AllowedGrantTypes = GrantTypes.HybridAndClientCredentials,
AllowAccessTokensViaBrowser = false,
RedirectUris = { $"{customerPortalBaseUri}/signin-oidc"},
FrontChannelLogoutUri = $"{customerPortalBaseUri}/signout-oidc",
PostLogoutRedirectUris = { $"{customerPortalBaseUri}/signout-callback-oidc" },
AllowOfflineAccess = true,
RequireConsent = false,
AllowedScopes =
{
IdentityServerConstants.StandardScopes.OpenId,
IdentityServerConstants.StandardScopes.Profile,
IdentityServerConstants.StandardScopes.Email
}
}
这是客户端/门户配置
services.AddAuthentication(options =>
{
options.DefaultScheme = CookieAuthenticationDefaults.AuthenticationScheme;
options.DefaultChallengeScheme = "oidc";
})
.AddCookie(CookieAuthenticationDefaults.AuthenticationScheme)
.AddOpenIdConnect("oidc", options =>
{
options.SignInScheme = CookieAuthenticationDefaults.AuthenticationScheme;
options.Authority = "http://myproxiedlogonsitebehindnginx.co.uk";
options.RequireHttpsMetadata = false;
options.ClientId = "mvc.portal";
options.ClientSecret = "21f51463-f436-4a84-92ce-1b520dd63a81";
options.ResponseType = "code id_token";
options.SaveTokens = true;
options.GetClaimsFromUserInfoEndpoint = true;
});
更新3 因此,现在我确信它与部署有关,因为如果我在本地计算机上运行mvc应用程序,但在容器(在nginx之后)中使用已部署的idsvr,则可以毫无问题地进行身份验证,但是,如果尝试版本的容器化门户网站仍然没有记录未处理的500,然后如果我重试该操作,则会得到以下记录:
UPDATE 3 So now I'm convinced it has something to do with the deployment, because if I run the mvc app on my local machine but use the deployed idsvr in the container (behind nginx) I can authenticate without a problem, however if I try the version of the containerised portal I still get an unhandled 500 without it being logged and then if I retry the action I get this logged:
[11:22:51 INF] Request starting HTTP/1.1 POST http://mvcportal.co.uk/signin-oidc application/x-www-form-urlencoded 1559
[11:22:51 ERR] Message contains error: 'invalid_grant', error_description: 'error_description is null', error_uri: 'error_uri is null', status code '400'.
[11:22:51 ERR] Exception occurred while processing message.
Microsoft.IdentityModel.Protocols.OpenIdConnect.OpenIdConnectProtocolException: Message contains error: 'invalid_grant'], error_description: 'error_description is null', error_uri: 'error_uri is null'.
推荐答案
所以我终于找到了答案.似乎Nginx中的默认标头限制不能很好地发挥作用,我在日志中发现了这一点
upstream sent too big header while reading response header from upstream
So I finally got to the bottom of it. It seems the default header limits in nginx don't play nice and I found this in the logs
upstream sent too big header while reading response header from upstream
更新nginx配置以包含这些行
Updating the nginx config to include the lines
proxy_buffer_size 128k;
proxy_buffers 4 256k;
proxy_busy_buffers_size 256k;
防止了502错误,并且现在所有身份验证都可以正常进行.
prevented the 502 error and it all authenticates fine now.
这篇关于IdentityServer4-缺少子声明的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!