In my previous post Unable to obtain configuration from: PII is hidden, I talked about error saying that OpenId Connect discovery information is missing. When you use some well established identity provider like IdentityServer etc. you do not see this errors. These identity providers have already implemented end points for a caller to discover information about OpenId Connect. But when you are implementing a custom OpenId provider with .Net Core 3.1, you are not going to have these end points. This is the case with my current project as well.
There is an easy solution to this.
The code will look like below.
[Route(".well-known")] [ApiController] public class OpenIdEndpointsController : ControllerBase { [HttpGet("openid-configuration")] public IActionResult OpenIdConfiguration() { return Ok("{\"issuer\":\"https://www.iassetsmanager.com\",id_token_signing_alg_values_supported:[\"HS256\"]}"); } }
You do not have to implement returning full discovery document. Just provide the bare minimum information and it will take care of errors during validation of Jwt tokens.
Implement well-known OpenId discovery end point
Draw Custom Legends In Infragistics Charts
Custom tool warning: No endpoints compatible with Silverlight 2 were found
How to plan CCSP Exam preparation
Develop a MongoDB pipeline to transform data into time buckets
Alert and Confirm pop up using BootBox in AngularJS
AngularJS Grouped Bar Chart and Line Chart using D3
How to lock and unlock account in Asp.Net Identity provider
2024 © Byteblocks, ALL Rights Reserved. Privacy Policy | Terms of Use