How to add a redirect url with a parameter(guid) in identity server 4? - identityserver4

I am trying to redirect the user to where they were in an application where it uses identity server 4 as the auth provider. The issue here is where the request is being made has a guid on the URL.
e.g. https://test.com/todo/bc91d6f5-f71d-401b-899f-f2d921b811d7
I have tried adding a wildcard (https://test.com/todo/*) in the client config of the identity server but it didn't work. Is this possible to do it on identity server 4?

Related

How to create a multi sql server authentication user with Laravel

I'm building an app using Laravel and SQL Server. What I want is to be able to use the Server Authentication Users as the user of my app. For example when a user want to connect to the application his login must be a Server Authentication User that will connect to the database just as it is done in the .env file. How can i so that?
(Sorry for my bad English)

IdentityServer4, Swift iOS App and External Identity Provider

IdentityServer newbie here....
I am building a mobile app and would like to provide the end user the ability to sign in using SSO for users that have a corporate identity provider and my company as the identity provider for those that don't have an identity provider.
it's possible that over time we add more external identity providers.
We have an on premise identityServer4 already installed and configured and only using it for client credentials for our API->API communications.
We also have an Azure Active Directory tenant with all of our AD accounts (our internal corporate accounts).
Here is what I would like to do (if possible of course):
Have the mobile app (swift and android, but for now let's just discuss swift) be completely unaware of any external identity providers and have it point to our on-premise identity server for authentication.
Add external identity providers in identity server
Control what external identity providers we "add" all on the backend and not have the UI layer concerned with specific external providers, but have the identity server redirect accordingly.
Not bother the user to have to select which provider to use (if I am a corporate user with an external IDP configured, it should automatically take me to MY e-idp login page, if not then present my own login page)
I am also open to the idea of using Azure identity management as the identity provider and add external identity providers there.
What about Azure B2C?
Can someone please point me in the right direction?
thanks in advance!
You can check this app integrated with AppAuth for iOS. Link in GitHub

is possible to enable two-factor authentication in ABP.IO Framework..?

facing issue to enable the two-factor authentication in ABP.io with identity server 4
How to modify the logic of identity server 4 controllers..?
now identity server 4 controllers in metadata, so I cannot edit this controllers

AngularJS Server session & authentication with nodeJS backend server

I have a front-end angularJS server that is getting data from a back-end nodeJS server from MySQL DB via middleware.
I created a front-end simple login form that needs to send data for authentication to the back-end server (checks if user exists in the db).
The back-end server returns user details in the case that the user is found in the DB or prints error login message or redirect to signup screen.
I'm looking for a guide or example on how to create a correct authentication system with sessions and cookies between the two servers.
Thank you.
You should choose use a token authentication or use cookies.
Take a look at this,it is a good guide :
http://code.tutsplus.com/tutorials/token-based-authentication-with-angularjs-nodejs--cms-22543

ADFS roles from SQL Server

Scenario: In an intranet application, ADFS uses AD for authentication(Account Store) and Sql server for authorization(roles/Attribute Store).
The roles are my own application specific. There are other applications that need to use ADFS. If ADFS is configured to use my SQL Server to fetch roles, what would other applications do? How will they manage their authorization?
Is my understanding correct? If yes, please verify my answer:
Ans: ADFS just returns me the AD identifier(SID/Name).I map this to my sql server roles. Role management should be done by my own application connecting to Sql server. Use session to prevent hitting DB for authorization every time.
To avoid hitting the SQL server for every authorization check, you could implement claims based authentication. Use the SQL attribute store to add your role claims to the AD user ID claims. The resulting claims ticket (SAML) is sent as a cookie and isn't fetched on every authentication check as it is kept as a cookie by the user browser available to the server on each and every request. The timeout/refresh can be set by ajusting the claims ticket TTL (time to live).Just a suggestion... =o)

Resources