removed extra spacing (#27435)
parent
46fe899dcc
commit
a8ffe52690
|
@ -126,7 +126,7 @@ If you don't get a text message, see twilio log page.
|
|||
|
||||
* Log in.
|
||||
|
||||
* The user account has enabled two-factor authentication, so you have to provide the second factor of authentication . In this tutorial you have enabled phone verification. The built in templates also allow you to set up email as the second factor. You can set up additional second factors for authentication such as QR codes. Tap **Submit**.
|
||||
* The user account has enabled two-factor authentication, so you have to provide the second factor of authentication. In this tutorial you have enabled phone verification. The built in templates also allow you to set up email as the second factor. You can set up additional second factors for authentication such as QR codes. Tap **Submit**.
|
||||
|
||||
![Send Verification Code view](2fa/_static/login2fa7.png)
|
||||
|
||||
|
|
|
@ -357,7 +357,7 @@ An application can first check the <xref:Microsoft.AspNetCore.Http.ConnectionInf
|
|||
|
||||
#### Kestrel
|
||||
|
||||
Kestrel controls client certificate negotation with the <xref:Microsoft.AspNetCore.Server.Kestrel.Https.HttpsConnectionAdapterOptions.ClientCertificateMode> option.
|
||||
Kestrel controls client certificate negotiation with the <xref:Microsoft.AspNetCore.Server.Kestrel.Https.HttpsConnectionAdapterOptions.ClientCertificateMode> option.
|
||||
|
||||
<xref:Microsoft.AspNetCore.Server.Kestrel.Https.ClientCertificateMode.DelayCertificate?displayProperty=nameWithType> is new option available in .NET 6 or later. When set, an app can check the <xref:Microsoft.AspNetCore.Http.ConnectionInfo.ClientCertificate> property to see if the certificate is available. If it isn't available, ensure the request body has been consumed before calling <xref:Microsoft.AspNetCore.Http.ConnectionInfo.GetClientCertificateAsync%2A> to negotiate one. Note `GetClientCertificateAsync` can return a null certificate if the client declines to provide one.
|
||||
|
||||
|
@ -1023,7 +1023,7 @@ There is a [known issue](https://github.com/dotnet/aspnetcore/issues/33586) wher
|
|||
|
||||
#### Kestrel
|
||||
|
||||
Kestrel controls client certificate negotation with the <xref:Microsoft.AspNetCore.Server.Kestrel.Https.HttpsConnectionAdapterOptions.ClientCertificateMode> option.
|
||||
Kestrel controls client certificate negotiation with the <xref:Microsoft.AspNetCore.Server.Kestrel.Https.HttpsConnectionAdapterOptions.ClientCertificateMode> option.
|
||||
|
||||
For .NET 5 and earlier Kestrel does not support renegotiating after the start of a connection to acquire a client certificate. This feature has been added in .NET 6.
|
||||
|
||||
|
@ -1681,7 +1681,7 @@ There is a [known issue](https://github.com/dotnet/aspnetcore/issues/33586) wher
|
|||
|
||||
#### Kestrel
|
||||
|
||||
Kestrel controls client certificate negotation with the <xref:Microsoft.AspNetCore.Server.Kestrel.Https.HttpsConnectionAdapterOptions.ClientCertificateMode> option.
|
||||
Kestrel controls client certificate negotiation with the <xref:Microsoft.AspNetCore.Server.Kestrel.Https.HttpsConnectionAdapterOptions.ClientCertificateMode> option.
|
||||
|
||||
For .NET 5 and earlier Kestrel does not support renegotiating after the start of a connection to acquire a client certificate. This feature has been added in .NET 6.
|
||||
|
||||
|
|
|
@ -28,7 +28,7 @@ The profile claims can be returned in the `id_token`, which is returned after a
|
|||
|
||||
[!code-csharp[](~/security/authentication/claims/sample6/WebRPmapClaims/Program.cs?name=snippet1&highlight=8-26)]
|
||||
|
||||
The preceding code requires the [Microsoft.AspNetCore.Authentication.OpenIdConnect](https://www.nuget.org/packages/Microsoft.AspNetCore.Authentication.OpenIdConnect) NuGet package .
|
||||
The preceding code requires the [Microsoft.AspNetCore.Authentication.OpenIdConnect](https://www.nuget.org/packages/Microsoft.AspNetCore.Authentication.OpenIdConnect) NuGet package.
|
||||
|
||||
Another way to get the user claims is to use the OpenID Connect User Info API. The ASP.NET Core client app uses the `GetClaimsFromUserInfoEndpoint` property to configure this. One important difference from the first settings, is that you must specify the claims you require using the `MapUniqueJsonKey` method, otherwise only the `name`, `given_name` and `email` standard claims will be available in the client app. The claims included in the `id_token` are mapped per default. This is the major difference to the first option. You must explicitly define some of the claims you require.
|
||||
|
||||
|
|
|
@ -444,7 +444,7 @@ public class RequireMfaHandler : AuthorizationHandler<RequireMfa>
|
|||
}
|
||||
```
|
||||
|
||||
In the program file , the `AddOpenIdConnect` method is used as the default challenge scheme. The authorization handler, which is used to check the `amr` claim, is added to the Inversion of Control container. A policy is then created which adds the `RequireMfa` requirement.
|
||||
In the program file, the `AddOpenIdConnect` method is used as the default challenge scheme. The authorization handler, which is used to check the `amr` claim, is added to the Inversion of Control container. A policy is then created which adds the `RequireMfa` requirement.
|
||||
|
||||
```csharp
|
||||
builder.Services.ConfigureApplicationCookie(options =>
|
||||
|
|
Loading…
Reference in New Issue