177 packages tagged with “Oidc”
Auth0 .NET SDK
Auth0 authentication middleware for ASP.NET Core.
Auth0 OIDC Client for native apps
Official Okta middleware for ASP.NET 4.8.1+. Easily add authentication and authorization to ASP.NET applications.
Auth0 OIDC Client for Xamarin iOS apps
Auth0 OIDC Client for Xamarin Android apps. Relies on deprecated support libraries from Google, use Auth0.OidcClient.AndroidX instead.
Auth0 OIDC Client for WPF apps
This package contains the library for authentication and authorization against https://zitadel.cloud. The package gives easy configurable options to integrate ZITADEL authentication with any web application or web API. Additionally, it functions as a client library for easy to use API access. This allows consumers to easily manage ZITADEL resources via the provided gRPC clients.
Auth0 OIDC Client for WinForms apps
Abstractions used by Veracity Identity
OAuth 2.0 and OpenID Connect components. Support .NET 10.0 Support .NET 9.0 Support .NET 8.0 Support .NET 7.0 Support .NET 6.0 Support .NET Standard 2.0 The company name ITfoxtec has changed to FoxIDs but the components will keep the ITfoxtec name as part of the component name for now.
Auth0 OIDC Client for Xamarin AndroidX apps
Log in with Veracity Identity in aspnetcore applications.
Auth0 OIDC Client for MAUI apps
This Package for Okta WebForm and MVC scenarios 1- This Package supports .net Frameworks versions betwwn 4.5.1 up to 4.8. 2- Addng new json Files copy OIDC info to it. 3- adding new Web.config param CanConnectOIDCFromServer = false 4- Allowing Logoff and automatic token refresh Just add to your scopes offline_access Make sure that CanConnectOIDCFromServer = true, 5- ErrorPage Handling, add the to web.config customErrors mode="On" defaultRedirect="customerror.html" 6- ErrorHandling Module, add to web.config system.webServer:modules: add name="OktaOIDCRequestModule" type="OktaOIDCFW.OktaOIDCRequestModule, OktaOIDCFW" 7- this Package will handle the login Automatically, you can handle that by yourself by adding to web.config AutomaticLogin = false 8- Adding the support for ASP.NET 4,5 and MVC just add ApplicationType = "ASPNET4" or ApplicationType = "MVC" or ApplicationType = "SECACPNET4" or ApplicationType = "SECACPNET5" to appsettings 9- Fix for Issue System.Web.HttpException: Server cannot append cookies after HTTP headers have been sent 10- New Param Added to select the startup class called StartupClass values WEB_FORMS_STARTUP or MVC_STARTUP 11- Adding the following Controls: SlidingExpiration, UseTokenLifetime, RequireHttpsMetadata, SaveTokens 12- Adding X-Forward-Proto to handle Load Balance 13- Enable Nonce cookie chceck control 14- reteun String.Empty istead of null incase of claims are emapty 15-Adding Direct Link Feature, it is disabled by default 16- Handling Cookies larger than 4090, starting from Version 18.1.3.6 17- Connect to LDAP to fill all missing Claims, this Feature available only for FW4.8, starting from Version 18.1.3.7
Based Microsoft.AspNetCore.Authentication.OpenIdConnect on Librame.AspNetCore extension package.
Auth0 OIDC Client for Universal Windows Platform (UWP) apps
C# library for Authlete Web APIs with which you can build an authorization server and OpenID provider that complies with OAuth 2.0 and OpenID Connect.
Helper library for claims-based identity, System.IdentityModel, JSON Web Tokens, OAuth 2.0 and OpenID Connect client
TheIdServer administration application.
a library to make local development of OAuth or OIDC end points simpler.
Creates an ASP.NET Core STS application using IdentityServer4 and Identity with localisation, TOTP, personal data, Bootstrap 4
Identity for OIDC based on Skoruba IdentityServer4 Admin custom impl
Log in with Veracity Identity in asp.net applications.
Adds support for OAuth 2.0 / OpenID Connect authentication to HttpClient. Call .AddOAuthHandler() after .AddTypedRest() (or .AddHttpClient() when not using main TypedRest package).
Host Owin per Vanguard.Identity.Oidc
OIDC / JWT Bearer Tokens authentication made easy for Azure Functions. This is a base package, in your project please use AzureFunctions.Extensions.OpenIDConnect.InProcess or AzureFunctions.Extensions.OpenIDConnect.Isolated