base on OpenID, OAuth 2.0, SCIM2.0, UMA2.0, FAPI, CIBA & OPENBANKING Framework for ASP.NET Core # Simpleidserver core
<img src="images/logo.svg" alt="SimpleIdServer" style="width:200px;"/>
[![Build status](https://ci.appveyor.com/api/projects/status/shtqlxhbda6gtdag?svg=true)](https://ci.appveyor.com/project/simpleidserver/simpleidserver)
[![Join the chat at https://app.gitter.im/#/room/#simpleidserver:gitter.im](https://badges.gitter.im/repo.svg)](https://app.gitter.im/#/room/#simpleidserver:gitter.im)
SimpleIdServer is an open source framework enabling the support of OPENID, OAUTH2.0, SCIM2.0, UMA2.0, FAPI and CIBA. It streamlines development, configuration and deployment of custom access control servers.
Thanks to its modularity and extensibility, SimpleIdServer can be customized to the specific needs of your organization for authentication, authorization and more.
[Website](http://simpleidserver.com), [Documentation](https://simpleidserver.com/docs/intro) and [Demo](https://website.simpleidserver.com/).
## Packages
| | | |
| --------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| `SimpleIdServer.IdServer` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.IdServer.svg)](https://nuget.org/packages/SimpleIdServer.IdServer) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.IdServer.svg)](https://nuget.org/packages/SimpleIdServer.IdServer) |
| `SimpleIdServer.IdServer.Email` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.IdServer.Email.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.Email) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.IdServer.Email.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.Email) |
| `SimpleIdServer.IdServer.Sms` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.IdServer.Sms.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.Sms) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.IdServer.Sms.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.Sms) |
| `SimpleIdServer.IdServer.WsFederation` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.IdServer.WsFederation.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.WsFederation) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.IdServer.WsFederation.svg)](https://nuget.org/packages/SimpleIdServer.IdServer.WsFederation) |
| `SimpleIdServer.Templates` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Templates.svg)](https://nuget.org/packages/SimpleIdServer.Templates) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Templates.svg)](https://nuget.org/packages/SimpleIdServer.Templates) |
| `SimpleIdServer.Scim` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Scim.svg)](https://nuget.org/packages/SimpleIdServer.Scim) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Scim.svg)](https://nuget.org/packages/SimpleIdServer.Scim) |
| `SimpleIdServer.Scim.Persistence.EF` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Scim.Persistence.EF.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Persistence.EF) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Scim.Persistence.EF.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Persistence.EF) |
| `SimpleIdServer.Scim.Persistence.MongoDB` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Scim.Persistence.MongoDB.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Persistence.MongoDB) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Scim.Persistence.MongoDB.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Persistence.MongoDB) |
| `SimpleIdServer.Scim.Client` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.Scim.Client.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Client) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.Scim.Client.svg)](https://nuget.org/packages/SimpleIdServer.Scim.Client) |
| `SimpleIdServer.OpenIdConnect` | [![NuGet](https://img.shields.io/nuget/v/SimpleIdServer.OpenIdConnect.svg)](https://nuget.org/packages/SimpleIdServer.OpenIdConnect) | [![NuGet](https://img.shields.io/nuget/dt/SimpleIdServer.OpenIdConnect.svg)](https://nuget.org/packages/SimpleIdServer.OpenIdConnect) |
# Preparation
Install SimpleIdServer templates.
```
dotnet new --install SimpleIdServer.Templates
```
This will add the following templates
| Command line | Description |
| ---------------------------- | ------------------------------------------------------------------------------------------------ |
| dotnet new idserver | Create Identity Server. By default, Entity Framework is configured to use SQLServer |
| dotnet new idserverwebsite | Create Identity Server website. By default, Entity Framework is configured to use SQLServer |
| dotnet new scim | Create SCIM Server. |
| dotnet new credissuer | Create credential issuer API. |
| dotnet new credissueradminui | Create credential issuer administration UI. |
## Create Visual Studio Solution
Open a command prompt and execute the following commands to create the directory structure for the solution.
```
mkdir Quickstart
cd Quickstart
mkdir src
dotnet new sln -n Quickstart
```
## Create IdentityServer project
To create a web project named `IdServer` with the `SimpleIdServer.IdServer` package installed, execute the command line :
```
cd src
dotnet new idserver -n IdServer
```
The following files will be created within a new `src/IdServer` directory :
* `IdServer.csproj` : Project file with the `SimpleIdServer.IdServer` NuGet package added.
* `appsettings.json` : Contains the ConnectionString.
* `Program.cs` : Main application entry point.
* `IdServerConfiguration.cs` : Contains the `Clients`, `Resources`.
Next, add the `IdServer` project into the Visual Studio Solution
```
cd ..
dotnet sln add ./src/IdServer/IdServer.csproj
```
Run the IdServer project, ensuring that it listens on the URL `https://localhost:5001`.
```
cd src/IdServer
dotnet run --urls=https://localhost:5001
```
The IdentityServer is now ready to be used.
By default, there is one administrator account configured. You can access their profile by navigating to the URL `https://localhost:5001/master` and authenticate using the following credentials :
* Login : administrator
* Password : password
## IdentityServer UI preview
The IdentityServer UI uses Bootstrap 5.
![IdentityServer](./images/IdentityServer-1.png)
## Create IdentityServer website project
create a web project named `IdServerWebsite` with the `SimpleIdServer.IdServer.Website` package installed, execute the command line :
```
cd src
dotnet new idserverwebsite -n IdServerWebsite
```
Run the `IdServerWebsite` project, it must listens on the url `https://localhost:5002`.
```
cd src/IdServerWebsite
dotnet run --urls=https://localhost:5002
```
The IdentityServer website is now ready to be used.
The website can be used to manage all aspects of an Identity Server solution, such as managing clients, users, and scopes.
## Identity Server website UI preview
The IdentityServer website UI uses Radzen.
![IdentityServerWebsite](./images/IdentityServerWebsite-2.png)
## SCIM Security
By default SCIM is configured to use API KEY authentication.
For clients to perform any operation, they must include one of those keys in the `HTTP HEADER Authorization Bearer` field.
| Owner | Value |
| -------- | ------------------------------------ |
| IdServer | ba521b3b-02f7-4a37-b03c-58f713bf88e7 |
| AzureAd | 1595a72a-2804-495d-8a8a-2c861e7a736a |
## Create SCIM project with EF support
Create a web project named `ScimEF` with the `SimpleIdServer.Scim.Persistence.EF` package installed and Entity Framework (EF) configured to use SQLServer, execute the command line :
```
cd src
dotnet new scim -n ScimEF --connectionString "Data Source=.;Initial Catalog=SCIM;Integrated Security=True;TrustServerCertificate=True" -t "SQLSERVER"
```
Next, add the `ScimEF` project into the Visual Studio Solution
```
cd ..
dotnet sln add ./src/ScimEF/ScimEF.csproj
```
Run the ScimEF project, ensuring that it listens on the URL `https://localhost:5003`.
```
cd src/SCIMEF
dotnet run --urls=https://localhost:5003
```
Now that the SCIM server is running, you can check its Schemas endpoint by accessing [https://localhost:5003/Schemas](https://localhost:5003/Schemas).
## Create SCIM project with MongoDB support
To create a web project named ScimMongoDB with the SimpleIdServer.Scim.Persistence.MongoDB package installed and MongoDB support, execute the command line :
```
cd src
dotnet new scim -n ScimMongoDB --connectionString "mongodb://localhost:27017" -t "MONGODB"
```
Next, add the `ScimMongoDB` project into the Visual Studio Solution
```
cd ..
dotnet sln add ./src/ScimMongoDB/ScimMongoDB.csproj
```
Run the ScimMongoDB project, ensuring that it listens on the URL `https://localhost:5003`.
```
cd src/ScimMongoDB
dotnet run --urls=https://localhost:5003
```
Now that the SCIM server is running, you can check its Schemas endpoint by accessing [https://localhost:5003/Schemas](https://localhost:5003/Schemas).
## Create credential issuer project
To create a web project named `CredentialIssuer` with the `SimpleIdServer.CredentialIssuer` package installed, execute the command line :
```
cd src
dotnet new credissuer -n CredentialIssuer
```
The following files will be created within a new `src/CredentialIssuer` directory :
* `CredentialIssuer.csproj` : Project file with the `SimpleIdServer.CredentialIssuer` NuGet package added.
* `appsettings.json` : Contains the properties to configure the Openid authentication, such as the ClientId, ClientSecret and Issuer.
* `Program.cs` : Main application entry point.
* `CredentialIssuerConfiguration.cs` : Contains the `CredentialConfigurations`.
Run the CredentialIssuer project, ensuring that it listens on the URL `https://localhost:5005`.
```
cd src/IdServer
dotnet run --urls=https://localhost:5005
```
The CredentialIssuer is now ready to be used.
## Credential issuer UI preview
The CredentialIssuer UI uses Bootstrap 5.
![CredentialIssuer](./images/CredentialIssuer-1.png)
## Create credential issuer website project
To create a web project named `CredentialIssuerAdminui` with the `SimpleIdServer.CredentialIssuer.Website` package installed, execute the command line :
```
cd src
dotnet new credissueradminui -n CredentialIssuerAdminui
```
Run the `CredentialIssuerAdminui` project, it must listens on the url `https://localhost:5006`.
```
cd src/IdServerWebsite
dotnet run --urls=https://localhost:5006
```
The credential issuer administration ui is now ready to be used.
The website can be used to manage the credential configurations.
## Credential issuer website UI preview
The CredentialIssuer website UI uses Radzen.
![CredentialIssuerAdminUi](./images/CredentialIssuer-2.png)
# Running with docker
To execute all the projects in Docker, execute the following commands :
```
psake dockerBuild
psake dockerUp
```
# Contributing
Please read [CONTRIBUTING.md](CONTRIBUTING.md) for details on our code of conduct, and the process for submitting pull requests to us.
# Contact us
To contact the team, you can send an email to `
[email protected]` or share your ideas in gitter.im.
The invitation link is https://app.gitter.im/#/room/#simpleidserver:gitter.im
", Assign "at most 3 tags" to the expected json: {"id":"10008","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"