Hi,
You can try:
public class TestMenuContributor : IMenuContributor
{
public async Task ConfigureMenuAsync(MenuConfigurationContext context)
{
if (context.Menu.Name == StandardMenus.User)
{
context.Menu.GetMenuItemOrNull("Account.LinkedAccounts").Url = "/account/Manage";
context.Menu.GetMenuItemOrNull("Account.AuthorityDelegation").Url = "/account/Manage";
}
}
}
public class MyBundleContributor : BundleContributor
{
public override void ConfigureBundle(BundleConfigurationContext context)
{
context.Files.RemoveAll(x => x.Contains("link-user") || x.Contains("authority-delegation"));
}
}
Configure<AbpBundlingOptions>(options =>
{
options.ScriptBundles.Configure(
BlazorLeptonThemeBundles.Scripts.Global,
bundle =>
{
bundle.Contributors.Add<MyBundleContributor>();
}
);
});
You can set the SaveTokens to true:
.AddMicrosoftAccount(MicrosoftAccountDefaults.AuthenticationScheme, options =>
{
//Personal Microsoft accounts as an example.
options.AuthorizationEndpoint = "https://login.microsoftonline.com/consumers/oauth2/v2.0/authorize";
options.TokenEndpoint = "https://login.microsoftonline.com/consumers/oauth2/v2.0/token";
options.SaveTokens = true;
options.Events.OnCreatingTicket = ticketContext =>
{
ticketContext.Identity.AddClaim(new Claim("urn:microsoftaccount:access_token", ticketContext.AccessToken));
return Task.CompletedTask;
};
})
HttpContext.GetTokenAsync(scheme: MicrosoftAccountDefaults.AuthenticationScheme,"access_token");
Hi,
I will check it
Hi,
Yes, I can confirm that, I create an issue for this: https://github.com/abpframework/abp/issues/16896
Hi,
Will it work if you deploy on local IIS?
Hi,
We will check it.
Hi,
Have you tried this without ABP? if it can work in MVC app then the same will work for ABP
Hi,
Their order is based on the order you configured, and the order in create and edit modal should be the same.
Can the order of the rendered properties be customized?
No, currently can't to specify the order
Hi,
You can try :
.AddMicrosoftAccount(MicrosoftAccountDefaults.AuthenticationScheme, options =>
{
//Personal Microsoft accounts as an example.
options.AuthorizationEndpoint = "https://login.microsoftonline.com/consumers/oauth2/v2.0/authorize";
options.TokenEndpoint = "https://login.microsoftonline.com/consumers/oauth2/v2.0/token";
options.Events.OnCreatingTicket = ticketContext =>
{
ticketContext.Identity.AddClaim(new Claim("urn:microsoftaccount:access_token", ticketContext.AccessToken));
return Task.CompletedTask;
};
})
Azure access token is added to the claim
Hi,
You can check this: https://support.abp.io/QA/Questions/5022/User-timeoutpermission-behaviour