我试图从Startup.cs文件中为下面的代码创建一个DI。但是作为.net的新手,我很难找到一个解决方案。
var tokenAcquisition = context.HttpContext.RequestServices
.GetRequiredService<ITokenAcquisition>() as ITokenAcquisition;
var graphClient = GraphServiceClientFactory
.GetAuthenticatedGraphClient(async () =>
{
return await tokenAcquisition
.GetAccessTokenForUserAsync(GraphConstants.Scopes);
}
);Startup.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Threading.Tasks;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc.Authorization;
using Microsoft.Identity.Web;
using Microsoft.Identity.Web.TokenCacheProviders.InMemory;
using Microsoft.Identity.Web.UI;
using Microsoft.IdentityModel.Protocols.OpenIdConnect;
using Microsoft.Graph;
using System.Net;
using Microsoft.AspNetCore.Builder;
using Microsoft.AspNetCore.Hosting;
using Microsoft.AspNetCore.HttpsPolicy;
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.Hosting;
namespace AD_Lookup
{
public class Startup
{
public Startup(IConfiguration configuration)
{
Configuration = configuration;
}
public IConfiguration Configuration { get; }
// This method gets called by the runtime. Use this method to add services to the container.
public void ConfigureServices(IServiceCollection services)
{
services.AddRazorPages().AddRazorRuntimeCompilation();
// Add Microsoft Identity Platform sign-in
services.AddSignIn(options =>
{
Configuration.Bind("AzureAd", options);
options.Prompt = "select_account";
var authCodeHandler = options.Events.OnAuthorizationCodeReceived;
options.Events.OnAuthorizationCodeReceived = async context => {
// Invoke the original handler first
// This allows the Microsoft.Identity.Web library to
// add the user to its token cache
await authCodeHandler(context);
var tokenAcquisition = context.HttpContext.RequestServices
.GetRequiredService<ITokenAcquisition>() as ITokenAcquisition;
var graphClient = GraphServiceClientFactory
.GetAuthenticatedGraphClient(async () =>
{
return await tokenAcquisition
.GetAccessTokenForUserAsync(GraphConstants.Scopes);
}
);
// Get user information from Graph
var user = await graphClient.Users["carvalhostephen20@hotmail.com"]
.Request()
.GetAsync();
context.Principal.AddUserGraphInfo(user);
};
options.Events.OnAuthenticationFailed = context => {
var error = WebUtility.UrlEncode(context.Exception.Message);
context.Response
.Redirect($"/Home/ErrorWithMessage?message=Authentication+error&debug={error}");
context.HandleResponse();
return Task.FromResult(0);
};
options.Events.OnRemoteFailure = context => {
if (context.Failure is OpenIdConnectProtocolException)
{
var error = WebUtility.UrlEncode(context.Failure.Message);
context.Response
.Redirect($"/Home/ErrorWithMessage?message=Sign+in+error&debug={error}");
context.HandleResponse();
}
return Task.FromResult(0);
};
}, options =>
{
Configuration.Bind("AzureAd", options);
});
// Add ability to call web API (Graph)
// and get access tokens
services.AddWebAppCallsProtectedWebApi(Configuration,
GraphConstants.Scopes)
// Use in-memory token cache
// See https://github.com/AzureAD/microsoft-identity-web/wiki/token-cache-serialization
.AddInMemoryTokenCaches();
// Require authentication
services.AddControllersWithViews(options =>
{
var policy = new AuthorizationPolicyBuilder()
.RequireAuthenticatedUser()
.Build();
options.Filters.Add(new AuthorizeFilter(policy));
})
// Add the Microsoft Identity UI pages for signin/out
.AddMicrosoftIdentityUI();
}
// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
{
//if (env.IsDevelopment())
//{
// app.UseDeveloperExceptionPage();
//}
//else
//{
// app.UseExceptionHandler("/Home/Error");
// // The default HSTS value is 30 days. You may want to change this for production scenarios, see https://aka.ms/aspnetcore-hsts.
// app.UseHsts();
//}
app.UseDeveloperExceptionPage();
app.UseHttpsRedirection();
app.UseStaticFiles();
app.UseRouting();
app.UseAuthentication();
app.UseAuthorization();
app.UseEndpoints(endpoints =>
{
endpoints.MapControllerRoute(
name: "default",
pattern: "{controller=Home}/{action=Index}/{id?}");
});
}
}
}Homecontroller.cs
using System;
using System.Collections.Generic;
using System.Diagnostics;
using System.Linq;
using System.Threading.Tasks;
using Microsoft.AspNetCore.Mvc;
using Microsoft.Extensions.Logging;
using AD_Lookup.Models;
using Microsoft.Graph;
using Microsoft.AspNetCore.Mvc.Authorization;
using Microsoft.Identity.Web;
using Microsoft.Identity.Web.TokenCacheProviders.InMemory;
using Microsoft.Identity.Web.UI;
using Microsoft.IdentityModel.Protocols.OpenIdConnect;
using System.Net;
using Microsoft.AspNetCore.Builder;
using Microsoft.AspNetCore.Hosting;
using Microsoft.AspNetCore.HttpsPolicy;
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.Hosting;
namespace AD_Lookup.Controllers
{
public class HomeController : Controller
{
private readonly ILogger<HomeController> _logger;
private ITokenAcquisition _tokenAcquisition;
public HomeController(ILogger<HomeController> logger, ITokenAcquisition tokenAcquisition)
{
_logger = logger;
_tokenAcquisition = tokenAcquisition;
}
public IActionResult Index()
{
return View();
}
public IActionResult UserSearch()
{
//string searchText = model.SearchBoxText;
//ViewData["searchData"] = searchText;
return View();
}
[HttpPost, ValidateAntiForgeryToken]
public async Task<IActionResult> SearchBox(UserSearchModel model)
{
string searchText = model.SearchBoxText;
ViewData["searchData"] = searchText;
var tokenAcquisition = this.HttpContext.RequestServices
.GetRequiredService<ITokenAcquisition>() as ITokenAcquisition;
var graphClient = GraphServiceClientFactory
.GetAuthenticatedGraphClient(async () =>
{
var accessToken =
await tokenAcquisition.GetAccessTokenForUserAsync(GraphConstants.Scopes, "2b51e32f-e865-48ef-b075-0a456dc76468");
return accessToken;
// .GetAccessTokenForUserAsync(GraphConstants.Scopes, "2b51e32f-e865-48ef-b075-0a456dc76468");
}
);
var user = await graphClient.Users[searchText]
.Request()
.GetAsync();
return View();
//return Content($"Hello {model.SearchBoxText}");
}
public IActionResult GroupSearch()
{
return View();
}
public IActionResult Privacy()
{
return View();
}
[ResponseCache(Duration = 0, Location = ResponseCacheLocation.None, NoStore = true)]
public IActionResult Error()
{
return View(new ErrorViewModel { RequestId = Activity.Current?.Id ?? HttpContext.TraceIdentifier });
}
}
}我不想在控制器中复制相同的代码,而是使用DI传递令牌获取的值。
使用图形API,我试图根据文本框中输入的电子邮件id打印用户信息。graphAPI提供了我试图实现的以下代码片段。
GraphServiceClient graphClient = new GraphServiceClient( authProvider );
var user = await graphClient.Users["carvalhostephen20@hotmail.com"]
.Request()
.GetAsync();这可以在https://developer.microsoft.com/en-us/graph/graph-explorer通过电子邮件搜索示例查询用户中找到。这就是我试图实现的功能。
将Startup.cs代码复制到控制器中会导致解决方案失败,并返回以下错误页:


发布于 2020-08-05 19:19:36
抱歉,我第一次问错了。因此,简单地说,当您调用ITokenAcquisition时,您会注册services.AddWebAppCallsProtectedWebApi()。尝试修改您的Homecontroller。移除这一行:
var tokenAcquisition = this.HttpContext.RequestServices
.GetRequiredService<ITokenAcquisition>() as ITokenAcquisition;并使用此实例:_tokenAcquisition
发布于 2020-12-28 09:05:02
我也面对过几次“没有帐户或登录提示被传递给AcquireTokenSilent”。
在我的情况下,每次出现这种情况时,解决方案都会清除完整的浏览器历史记录(包括cookie)。我没有调查确切的原因,因为这个解决方案对我来说已经足够好了,但是它似乎是由浏览器缓存某些令牌引起的,这些令牌需要在将某些东西更改为令牌获取代码之后刷新。
https://stackoverflow.com/questions/63271434
复制相似问题