I've created an ASP.Net MVC5 application, in which I have configured (and have working fine) Individual User Accounts via Google, Facebook, etc.
What I'd like to do is also support authentication against Azure Active Directory (Organizational Accounts). This would be for internal staff to be able to logon to the app as administrators.
All existing information/guides/documentation I've found typically deals with using one or the other. How would I enable them both together?
If there needs to be a separate logon form for each type of user, that would not be an issue.
EDIT:
I was looking at the Application configuration within Azure Active Directory portal, and notice that they define an "OAUTH 2.0 AUTHORIZATION ENDPOINT". Can MVC5 be configured within Startup.Auth.cs
to use this?
I managed to implement this by doing the following:
First, adding a reference to the
Microsoft.Owin.Security.OpenIdConnect
Nuget package.Second, configuring it in my
Startup.Auth.cs
:Third, I setup the application in the Azure Portal (classic):
Fourth, I added a separate logon page for admin users:
Fifth, the
ExternalLogin
action doesn't need to change - we just let OWIN middleware redirect us to the external login page. The flow would then direct the user back to theExternalLoginCallback
action.Finally, in the
ExternalLoginCallback
action, I check the incoming claims to determine that the login was via Azure AD, and instead of calling into ASP.NET Identity, I construct my ownClaimsIdentity
, which has all my (application specific) claim information which my application recognises as an admin user.Now, admin users navigate to
https://example.com/admin
, click the login button, are redirected to the Azure AD login, and windup back at the application as an admin user.