ok, Can you share some screenshots? we are trying to understand the problem.
hi
AddDevelopmentEncryptionCertificate
AddDevelopmentEncryptionAndSigningCertificate cannot be used in applications deployed on IIS or Azure App Service: trying to use them on IIS or Azure App Service will result in an exception being thrown at runtime (unless the application pool is configured to load a user profile). To avoid that, consider creating self-signed certificates and storing them in the X.509 certificates store of the host machine(s). Please refer to: https://documentation.openiddict.com/configuration/encryption-and-signing-credentials.html#registering-a-development-certificate
You can create a latest(7.1) project to see below code.
dotnet dev-certs https -v -ep authserver.pfx -p 2D7AA457-5D33-48D6-936F-C48E5EF468ED
if (!hostingEnvironment.IsDevelopment())
{
PreConfigure<AbpOpenIddictAspNetCoreOptions>(options =>
{
options.AddDevelopmentEncryptionAndSigningCertificate = false;
});
PreConfigure<OpenIddictServerBuilder>(builder =>
{
builder.AddSigningCertificate(GetSigningCertificate(hostingEnvironment, configuration));
builder.AddEncryptionCertificate(GetSigningCertificate(hostingEnvironment, configuration));
builder.SetIssuer(new Uri(configuration["AuthServer:Authority"]));
});
}
private X509Certificate2 GetSigningCertificate(IWebHostEnvironment hostingEnv, IConfiguration configuration)
{
var fileName = "authserver.pfx";
var passPhrase = "2D7AA457-5D33-48D6-936F-C48E5EF468ED";
var file = Path.Combine(hostingEnv.ContentRootPath, fileName);
if (!File.Exists(file))
{
throw new FileNotFoundException($"Signing Certificate couldn't found: {file}");
}
return new X509Certificate2(file, passPhrase);
}
``
hi
[ExposeServices(typeof(MultiTenantConnectionStringResolver), typeof(IConnectionStringResolver))]
hi
You can add a global javascript to dynamically change its height and top according to the logo.
hi
Please remove the offline_access
from oAuthConfig
to disable the refresh token
.
const oAuthConfig = {
responseType: 'code',
scope: 'offline_access MyProjectName'
};
We could write an angular interceptor and use o-auth service to invalidate the token. This will not work for mvc sites
Did you select the Remember me
when you login MVC website?
The default authentication cookie of MVC is session. It will be invalid after closing/quitting the browser.