hi
If all of your apps run on the same intranet. They can work locally.
Just like: Local database. localhost:app1, localhost:app2 , localhost:app3
Apps need to be able to communicate with each other(http).
Thanks.
hi
, but we want to use a separate MSSQL DB to store the audit data
What is your current app database type? Is MSSQL too?
If so, you only need to add a new connection string.
See https://abp.io/docs/latest/framework/fundamentals/connection-strings#configure-the-connection-strings
DbContextFactoryIMyProjectNameDbSchemaMigrator for the new DbContext, then DbMigrator will use it to create the database.Thanks
hi
Reproducible repository: 👉 https://github.com/franciscosl-fnet/abp-app-domain-based
Can you share the steps?
I will check it
Thanks.
hi
Do you mean no internet or offline?
Apps need to be able to communicate with each other(http).
Thanks.
Move to https://abp.io/support/questions/10221/Call-api-in-Web-not-found#answer-3a1e3816-64ee-2c73-0d15-a31199f1b27b
Great!
hi
You don't need to add CookieAuthentication; Identity.Application is already here.
private void ConfigureExternalProviders(ServiceConfigurationContext context)
{
context.Services.AddAuthentication(options =>
{
//options.DefaultScheme = CookieAuthenticationDefaults.AuthenticationScheme;
//options.DefaultChallengeScheme = "Okta";
//options.DefaultSignOutScheme = "Okta";
})
//.AddCookie(CookieAuthenticationDefaults.AuthenticationScheme)
.AddOpenIdConnect("Okta", options =>
{
options.Authority = "https://myauthentication.okta.com/oauth2/default";
options.ClientId = "MyClientId";
options.ClientSecret = "MyClientSecret";
options.CallbackPath = "/signin-azuread-oidc";
options.ResponseType = OpenIdConnectResponseType.Code;
options.MapInboundClaims = false;
options.Scope.Add("email");
options.Events = new OpenIdConnectEvents
{
OnRedirectToIdentityProvider = redirectContext =>
{
redirectContext.ProtocolMessage.RedirectUri = "https://int-fbteammgmt.lpl-cloud.com/signin-azuread-oidc";
return Task.CompletedTask;
}
};
});
}
It seems you changed the default authentication scheme to Cookies instead of Identity.Application
Can you share the source code of Chanel.Calendar.Web.CalendarWebModule?
Thanks.
You don't need to add CookieAuthentication; Identity.Application is already here.
private void ConfigureExternalProviders(ServiceConfigurationContext context)
{
context.Services.AddAuthentication(options =>
{
//options.DefaultScheme = CookieAuthenticationDefaults.AuthenticationScheme;
//options.DefaultChallengeScheme = "Okta";
//options.DefaultSignOutScheme = "Okta";
})
//.AddCookie(CookieAuthenticationDefaults.AuthenticationScheme)
.AddOpenIdConnect("Okta", options =>
{
options.Authority = "https://myauthentication.okta.com/oauth2/default";
options.ClientId = "MyClientId";
options.ClientSecret = "MyClientSecret";
options.CallbackPath = "/signin-azuread-oidc";
options.ResponseType = OpenIdConnectResponseType.Code;
options.MapInboundClaims = false;
options.Scope.Add("email");
options.Events = new OpenIdConnectEvents
{
OnRedirectToIdentityProvider = redirectContext =>
{
redirectContext.ProtocolMessage.RedirectUri = "https://int-fbteammgmt.lpl-cloud.com/signin-azuread-oidc";
return Task.CompletedTask;
}
};
});
}
Great 👍