base on OpenID, OAuth 2.0, SCIM2.0, UMA2.0, FAPI, CIBA & OPENBANKING Framework for ASP.NET Core # Simpleidserver core <img src="images/logo.svg" alt="SimpleIdServer" style="width:200px;"/> [![Build status](https://ci.appveyor.com/api/projects/status/shtqlxhbda6gtdag?svg=true)](https://ci.appveyor.com/project/simpleidserver/simpleidserver) [![Join the chat at https://app.gitter.im/#/room/#simpleidserver:gitter.im](https://badges.gitter.im/repo.svg)](https://app.gitter.im/#/room/#simpleidserver:gitter.im) SimpleIdServer is an open source framework enabling the support of OPENID, OAUTH2.0, SCIM2.0, UMA2.0, FAPI and CIBA. It streamlines development, configuration and deployment of custom access control servers. Thanks to its modularity and extensibility, SimpleIdServer can be customized to the specific needs of your organization for authentication, authorization and more. [Website](http://simpleidserver.com), [Documentation](https://simpleidserver.com/docs/intro) and [Demo](https://website.simpleidserver.com/master/clients). ## Packages | | | | | --------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------- | | `SimpleIdServer.IdServer` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.IdServer.svg)](https://nuget.org/packages/SimpleIdServer.IdServer) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.IdServer.svg)](https://nuget.org/packages/SimpleIdServer.IdServer) | | `SimpleIdServer.IdServer.Email` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.IdServer.Email.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.Email) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.IdServer.Email.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.Email) | | `SimpleIdServer.IdServer.Sms` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.IdServer.Sms.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.Sms) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.IdServer.Sms.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.Sms) | | `SimpleIdServer.IdServer.WsFederation` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.IdServer.WsFederation.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.WsFederation) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.IdServer.WsFederation.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.WsFederation) | | `SimpleIdServer.Templates` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Templates.svg)](https://nuget.org/packages/SimpleIdServer.Templates) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Templates.svg)](https://nuget.org/packages/SimpleIdServer.Templates) | | `SimpleIdServer.Scim` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Scim.svg)](https://nuget.org/packages/SimpleIdServer.Scim) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Scim.svg)](https://nuget.org/packages/SimpleIdServer.Scim) | | `SimpleIdServer.Scim.Persistence.EF` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Scim.Persistence.EF.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Persistence.EF) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Scim.Persistence.EF.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Persistence.EF) | | `SimpleIdServer.Scim.Persistence.MongoDB` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Scim.Persistence.MongoDB.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Persistence.MongoDB) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Scim.Persistence.MongoDB.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Persistence.MongoDB) | | `SimpleIdServer.Scim.Client` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Scim.Client.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Client) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Scim.Client.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Client) | | `SimpleIdServer.OpenIdConnect` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.OpenIdConnect.svg)](https://nuget.org/packages/SimpleIdServer.OpenIdConnect) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.OpenIdConnect.svg)](https://nuget.org/packages/SimpleIdServer.OpenIdConnect) | # Preparation Install SimpleIdServer templates. ``` dotnet new --install SimpleIdServer.Templates ``` This will add the following templates | Command line | Description | | ---------------------------- | ------------------------------------------------------------------------------------------------ | | dotnet new idserver | Create Identity Server. By default, Entity Framework is configured to use SQLServer | | dotnet new idserverwebsite | Create Identity Server website. By default, Entity Framework is configured to use SQLServer | | dotnet new scim | Create SCIM Server. | | dotnet new credissuer | Create credential issuer API. | | dotnet new credissueradminui | Create credential issuer administration UI. | ## Create Visual Studio Solution Open a command prompt and execute the following commands to create the directory structure for the solution. ``` mkdir Quickstart cd Quickstart mkdir src dotnet new sln -n Quickstart ``` ## Create IdentityServer project To create a web project named `IdServer` with the `SimpleIdServer.IdServer` package installed, execute the command line : ``` cd src dotnet new idserver -n IdServer ``` The following files will be created within a new `src/IdServer` directory : * `IdServer.csproj` : Project file with the `SimpleIdServer.IdServer` NuGet package added. * `appsettings.json` : Contains the ConnectionString. * `Program.cs` : Main application entry point. * `IdServerConfiguration.cs` : Contains the `Clients`, `Resources`. Next, add the `IdServer` project into the Visual Studio Solution ``` cd .. dotnet sln add ./src/IdServer/IdServer.csproj ``` Run the IdServer project, ensuring that it listens on the URL `https://localhost:5001`. ``` cd src/IdServer dotnet run --urls=https://localhost:5001 ``` The IdentityServer is now ready to be used. By default, there is one administrator account configured. You can access their profile by navigating to the URL `https://localhost:5001/master` and authenticate using the following credentials : * Login : administrator * Password : password ## IdentityServer UI preview The IdentityServer UI uses Bootstrap 5. ![IdentityServer](./images/IdentityServer-1.png) ## Create IdentityServer website project create a web project named `IdServerWebsite` with the `SimpleIdServer.IdServer.Website` package installed, execute the command line : ``` cd src dotnet new idserverwebsite -n IdServerWebsite ``` Run the `IdServerWebsite` project, it must listens on the url `https://localhost:5002`. ``` cd src/IdServerWebsite dotnet run --urls=https://localhost:5002 ``` The IdentityServer website is now ready to be used. The website can be used to manage all aspects of an Identity Server solution, such as managing clients, users, and scopes. ## Identity Server website UI preview The IdentityServer website UI uses Radzen. ![IdentityServerWebsite](./images/IdentityServerWebsite-2.png) ## SCIM Security By default SCIM is configured to use API KEY authentication. For clients to perform any operation, they must include one of those keys in the `HTTP HEADER Authorization Bearer` field. | Owner | Value | | -------- | ------------------------------------ | | IdServer | ba521b3b-02f7-4a37-b03c-58f713bf88e7 | | AzureAd | 1595a72a-2804-495d-8a8a-2c861e7a736a | ## Create SCIM project with EF support Create a web project named `ScimEF` with the `SimpleIdServer.Scim.Persistence.EF` package installed and Entity Framework (EF) configured to use SQLServer, execute the command line : ``` cd src dotnet new scim -n ScimEF --connectionString "Data Source=.;Initial Catalog=SCIM;Integrated Security=True;TrustServerCertificate=True" -t "SQLSERVER" ``` Next, add the `ScimEF` project into the Visual Studio Solution ``` cd .. dotnet sln add ./src/ScimEF/ScimEF.csproj ``` Run the ScimEF project, ensuring that it listens on the URL `https://localhost:5003`. ``` cd src/SCIMEF dotnet run --urls=https://localhost:5003 ``` Now that the SCIM server is running, you can check its Schemas endpoint by accessing [https://localhost:5003/Schemas](https://localhost:5003/Schemas). ## Create SCIM project with MongoDB support To create a web project named ScimMongoDB with the SimpleIdServer.Scim.Persistence.MongoDB package installed and MongoDB support, execute the command line : ``` cd src dotnet new scim -n ScimMongoDB --connectionString "mongodb://localhost:27017" -t "MONGODB" ``` Next, add the `ScimMongoDB` project into the Visual Studio Solution ``` cd .. dotnet sln add ./src/ScimMongoDB/ScimMongoDB.csproj ``` Run the ScimMongoDB project, ensuring that it listens on the URL `https://localhost:5003`. ``` cd src/ScimMongoDB dotnet run --urls=https://localhost:5003 ``` Now that the SCIM server is running, you can check its Schemas endpoint by accessing [https://localhost:5003/Schemas](https://localhost:5003/Schemas). ## Create credential issuer project To create a web project named `CredentialIssuer` with the `SimpleIdServer.CredentialIssuer` package installed, execute the command line : ``` cd src dotnet new credissuer -n CredentialIssuer ``` The following files will be created within a new `src/CredentialIssuer` directory : * `CredentialIssuer.csproj` : Project file with the `SimpleIdServer.CredentialIssuer` NuGet package added. * `appsettings.json` : Contains the properties to configure the Openid authentication, such as the ClientId, ClientSecret and Issuer. * `Program.cs` : Main application entry point. * `CredentialIssuerConfiguration.cs` : Contains the `CredentialConfigurations`. Run the CredentialIssuer project, ensuring that it listens on the URL `https://localhost:5005`. ``` cd src/IdServer dotnet run --urls=https://localhost:5005 ``` The CredentialIssuer is now ready to be used. ## Credential issuer UI preview The CredentialIssuer UI uses Bootstrap 5. ![CredentialIssuer](./images/CredentialIssuer-1.png) ## Create credential issuer website project To create a web project named `CredentialIssuerAdminui` with the `SimpleIdServer.CredentialIssuer.Website` package installed, execute the command line : ``` cd src dotnet new credissueradminui -n CredentialIssuerAdminui ``` Run the `CredentialIssuerAdminui` project, it must listens on the url `https://localhost:5006`. ``` cd src/IdServerWebsite dotnet run --urls=https://localhost:5006 ``` The credential issuer administration ui is now ready to be used. The website can be used to manage the credential configurations. ## Credential issuer website UI preview The CredentialIssuer website UI uses Radzen. ![CredentialIssuerAdminUi](./images/CredentialIssuer-2.png) # Running with docker To execute all the projects in Docker, execute the following commands : ``` psake dockerBuild psake dockerUp ``` # Contributing Please read [CONTRIBUTING.md](CONTRIBUTING.md) for details on our code of conduct, and the process for submitting pull requests to us. # Contact us To contact the team, you can send an email to `agentsimpleidserver@gmail.com` or share your ideas in gitter.im. The invitation link is https://app.gitter.im/#/room/#simpleidserver:gitter.im ", Assign "at most 3 tags" to the expected json: {"id":"10008","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"