languages | page_type | name | description | products | urlFragment | ||||
---|---|---|---|---|---|---|---|---|---|
|
sample |
Blazor Server application app that makes a request to the Graph API after signing in the user |
This ASP.NET Core 6 Blazor Server application app signs in the user and then makes a request to Microsoft Graph for the user's profile data. |
|
ms-identity-docs-code-app-csharp-blazorserver |
ASP.NET Core | Blazor Server application | user sign-in, protected web API access (Microsoft Graph) | Microsoft identity platform
This ASP.NET Core Blazor Server application application authenticates a user and then makes a request to the Graph API as the authenticated user. The response to the request is presented to the user.
- Microsoft Entra tenant and the permissions or role required for managing app registrations in the tenant.
- .NET 6.0 SDK
First, complete the steps in Register an application with the Microsoft identity platform to register the application.
Use these settings in your app registration.
App registration setting |
Value for this sample app | Notes |
---|---|---|
Name | active-directory-dotnet-blazorserver |
Suggested value for this sample. You can change the app name at any time. |
Supported account types | Accounts in this organizational directory only (Single tenant) | Suggested value for this sample. |
Platform type | Web | Required value for this sample |
Redirect URIs | http://localhost:5000/signin-oidc |
Required value for this sample |
ℹ️ Bold text in the tables above matches (or is similar to) a UI element in the Microsoft Entra admin center, while
code formatting
indicates a value you enter into a text box in the Microsoft Entra admin center.
Next, open the Api.csproj project under the the sign-in-blazorserver folder in your code editor.
In appsettings.json, update each variable with values from the app registration you created earlier.
"TenantId": "[Enter 'common', or 'organizations' or the Tenant ID obtained from the Microsoft Entra admin center]",
"ClientId": "[Enter the Client Id (Application ID) obtained from the Microsoft Entra admin center]",
"ClientSecret": "[Copy the client secret added to the app from the Microsoft Entra admin center]",
-
Execute the following command to get the app up and running:
dotnet run
-
Once the web app is listening, navigate to https://localhost:5001. Click the Sign In button and complete the login process.
-
Click Sign Out
This ASP.NET Core 6 Blazor Server application is created using the .NET Blazor Server App template. The app is adding sign-in to protect itself, and as a consequence this is requiring the user to be authenticated in Microsoft Entra ID.
When this .NET Blazor Server starts and before listening for any HTTP requests, it bootstraps the application using a single-surface API provided as part of Microsoft.Identity.Web and Microsoft.Idenitty.Web.UI. The former is tying ASP.NET Core, its authentication middleware for sign-in, and the Microsoft Authentication Library (MSAL) for .NET, while the latter adds UI components and controllers to facilitate user sign-in, sign-out, and other account experiences. All the details required for authentication are being gathered from a configuration section named AzureAd
as well as others entries used during the call to a protected API, like the scopes. As for authorization, it is using the default policy options. Additionally, special services are injected specifically for Blazor for re-signing, consent and Conditional Access purposes. The recommended pattern to acquire tokens is first attempting to acquire them non-interactevelly (or silent from cache), and then interactively. Therefore, it is required to store the tokens for them to be cached. In this tutorial tokens are being stored in memory.
When users navigate to the home page, the application initiates an authentication flow, more specifically an Authorization code type flow (OAuth 2 authorization code grant). During this authentication flow, the user is prompted for their credentials, by Microsoft Entra ID, if the token has to be acquired interactively, and then asked to consent to the permissions. Upon successful authentication, this web app is making a call to the Microsoft Graph /me endpoint from the Index page by using an injected IDownstreamWebApi service. This helper facilitates making an HTTP GET request to the protected web API adding the cached or newly acquired user's access token in the HTTP Authorization header. The app displays that you've successfully logged in using your Microsoft Entra credentials, and the Microsoft Graph API response.
When a user logs out, their browser is redirected to a public route confirming the user signed-out.
If you can't get the sample working, you've checked Stack Overflow, and you've already searched the issues in this sample's repository, open an issue report the problem.
- Search the GitHub issues in the repository - your problem might already have been reported or have an answer.
- Nothing similar? Open an issue that clearly explains the problem you're having running the sample app.
⚠️ WARNING: Any issue in this repository not limited to running one of its sample apps will be closed without being addressed.
For all other requests, see Support and help options for developers | Microsoft identity platform.
If you'd like to contribute to this sample, see CONTRIBUTING.MD.
This project has adopted the Microsoft Open Source Code of Conduct. For more information, see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.