Warning: file_get_contents(/data/phpspider/zhask/data//catemap/2/csharp/265.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
C# 如何在Azure active directory中使用多个OpenIdConnectAuthenticationOptions_C#_Azure_Oauth 2.0_Azure Active Directory_Openid Connect - Fatal编程技术网

C# 如何在Azure active directory中使用多个OpenIdConnectAuthenticationOptions

C# 如何在Azure active directory中使用多个OpenIdConnectAuthenticationOptions,c#,azure,oauth-2.0,azure-active-directory,openid-connect,C#,Azure,Oauth 2.0,Azure Active Directory,Openid Connect,在我们的项目中,我们希望显示两个选项(以雇员身份登录和以客户身份登录)。根据选择,我们希望使用Azure Active directory B2B或Azure B2C对用户进行身份验证 我可以将身份验证模式设置为被动,并在单击链接后打开登录页面。当配置单个OpenIdConnectAuthenticationOptions时,它运行良好。但当我配置多个OpenIdConnectAuthenticationOptions时,这不起作用 app.UseOpenIdConnectAut

在我们的项目中,我们希望显示两个选项(以雇员身份登录和以客户身份登录)。根据选择,我们希望使用Azure Active directory B2B或Azure B2C对用户进行身份验证

我可以将身份验证模式设置为被动,并在单击链接后打开登录页面。当配置单个OpenIdConnectAuthenticationOptions时,它运行良好。但当我配置多个OpenIdConnectAuthenticationOptions时,这不起作用

        app.UseOpenIdConnectAuthentication(
            new OpenIdConnectAuthenticationOptions
            {
                AuthenticationMode = AuthenticationMode.Passive,
                MetadataAddress = String.Format(aadInstance2, tenant2, SignUpSignInPolicyId),
                ClientId = clientId2,
                RedirectUri = redirectUri2,
                PostLogoutRedirectUri = postLogoutRedirectUri,
            });

        app.UseOpenIdConnectAuthentication(
            new OpenIdConnectAuthenticationOptions
            {
                AuthenticationMode = AuthenticationMode.Passive,
                ClientId = clientId,
                Authority = authority,
                PostLogoutRedirectUri = postLogoutRedirectUri,
            });

    public void Redirect()
    {
       HttpContext.GetOwinContext().Authentication.Challenge(new AuthenticationProperties { RedirectUri = "https://localhost/WebApp1/" }, OpenIdConnectAuthenticationDefaults.AuthenticationType);
    }

您可以尝试使用
AuthenticationType
。此属性标识管道中的此中间件,并用于引用它进行身份验证操作。例如,您可以定义如下配置:

app.UseOpenIdConnectAuthentication(
    new OpenIdConnectAuthenticationOptions("AADLogin")
    {
        AuthenticationMode = AuthenticationMode.Passive,
        MetadataAddress = String.Format(aadInstance2, tenant2, SignUpSignInPolicyId),
        ClientId = clientId2,
        RedirectUri = redirectUri2,
        PostLogoutRedirectUri = postLogoutRedirectUri,
    });

app.UseOpenIdConnectAuthentication(
    new OpenIdConnectAuthenticationOptions("B2CLogin")
    {
        AuthenticationMode = AuthenticationMode.Passive,
        ClientId = clientId,
        Authority = authority,
        PostLogoutRedirectUri = postLogoutRedirectUri,
    });
然后根据用户选择,您可以选择使用哪一个:

    if ()
    {
        HttpContext.GetOwinContext()
            .Authentication.Challenge(new AuthenticationProperties {RedirectUri = "/"},
               "AADLogin");
    }
    else
    {
        HttpContext.GetOwinContext()
           .Authentication.Challenge(new AuthenticationProperties { RedirectUri = "/" },
              "B2CLogin");
    }

您能告诉我,在这种情况下如何获得用户身份吗?您的问题似乎在中得到了解决。