hi
We will check and improve this case.
This should not be logged as "Information", this should be thrown as a critical error if it's going to abort execution.
Can you share the current app logs?
Thanks.
hi
If all of your apps run on the same intranet. They can work locally.
Just like: Local database. localhost:app1, localhost:app2 , localhost:app3
Apps need to be able to communicate with each other(http).
Thanks.
hi
, but we want to use a separate MSSQL DB to store the audit data
What is your current app database type? Is MSSQL too?
If so, you only need to add a new connection string.
See https://abp.io/docs/latest/framework/fundamentals/connection-strings#configure-the-connection-strings
DbContextFactoryIMyProjectNameDbSchemaMigrator for the new DbContext, then DbMigrator will use it to create the database.Thanks
hi
Reproducible repository: 👉 https://github.com/franciscosl-fnet/abp-app-domain-based
Can you share the steps?
I will check it
Thanks.
hi
Do you mean no internet or offline?
Apps need to be able to communicate with each other(http).
Thanks.
Move to https://abp.io/support/questions/10221/Call-api-in-Web-not-found#answer-3a1e3816-64ee-2c73-0d15-a31199f1b27b
Great!
hi
You don't need to add CookieAuthentication; Identity.Application is already here.
private void ConfigureExternalProviders(ServiceConfigurationContext context)
{
context.Services.AddAuthentication(options =>
{
//options.DefaultScheme = CookieAuthenticationDefaults.AuthenticationScheme;
//options.DefaultChallengeScheme = "Okta";
//options.DefaultSignOutScheme = "Okta";
})
//.AddCookie(CookieAuthenticationDefaults.AuthenticationScheme)
.AddOpenIdConnect("Okta", options =>
{
options.Authority = "https://myauthentication.okta.com/oauth2/default";
options.ClientId = "MyClientId";
options.ClientSecret = "MyClientSecret";
options.CallbackPath = "/signin-azuread-oidc";
options.ResponseType = OpenIdConnectResponseType.Code;
options.MapInboundClaims = false;
options.Scope.Add("email");
options.Events = new OpenIdConnectEvents
{
OnRedirectToIdentityProvider = redirectContext =>
{
redirectContext.ProtocolMessage.RedirectUri = "https://int-fbteammgmt.lpl-cloud.com/signin-azuread-oidc";
return Task.CompletedTask;
}
};
});
}
It seems you changed the default authentication scheme to Cookies instead of Identity.Application
Can you share the source code of Chanel.Calendar.Web.CalendarWebModule?
Thanks.
You don't need to add CookieAuthentication; Identity.Application is already here.
private void ConfigureExternalProviders(ServiceConfigurationContext context)
{
context.Services.AddAuthentication(options =>
{
//options.DefaultScheme = CookieAuthenticationDefaults.AuthenticationScheme;
//options.DefaultChallengeScheme = "Okta";
//options.DefaultSignOutScheme = "Okta";
})
//.AddCookie(CookieAuthenticationDefaults.AuthenticationScheme)
.AddOpenIdConnect("Okta", options =>
{
options.Authority = "https://myauthentication.okta.com/oauth2/default";
options.ClientId = "MyClientId";
options.ClientSecret = "MyClientSecret";
options.CallbackPath = "/signin-azuread-oidc";
options.ResponseType = OpenIdConnectResponseType.Code;
options.MapInboundClaims = false;
options.Scope.Add("email");
options.Events = new OpenIdConnectEvents
{
OnRedirectToIdentityProvider = redirectContext =>
{
redirectContext.ProtocolMessage.RedirectUri = "https://int-fbteammgmt.lpl-cloud.com/signin-azuread-oidc";
return Task.CompletedTask;
}
};
});
}