{props.sampleUrls.origin}
.
-{`using Logto.AspNetCore.Authentication;
+
-First, let's enter your redirect URI. E.g. {props.sampleUrls.origin + 'Callback'}
(replace the endpoint with yours). This is where Logto will redirect users after they sign in.
-
-For example, set the URI to {props.sampleUrls.origin + 'SignedOutCallback'}
(replace the endpoint with yours):
-
{props.sampleUrls.origin}
.
-First, let's enter your redirect URI. E.g. {props.sampleUrls.origin + 'Callback'}
(replace the endpoint with yours). This is where Logto will redirect users after they sign in.
-
-For example, set the URI to {props.sampleUrls.origin + 'SignedOutCallback'}
(replace the endpoint with yours):
-
+
{`// ...
IdentityServer: {
Authority: '${props.endpoint}oidc',
ClientId: '${props.app.id}',
- RedirectUri: '${props.redirectUris[0] ?? props.sampleUrls.callback}',
- PostLogoutRedirectUri: '${props.postLogoutRedirectUris[0] ?? props.sampleUrls.origin}',
+ RedirectUri: '${props.redirectUris[0] ?? defaultRedirectUri}',
+ PostLogoutRedirectUri: '${props.postLogoutRedirectUris[0] ?? defaultPostSignOutUri}',
ResponseType: 'code',
Scope: 'openid profile', // Add more scopes if needed
},
@@ -112,7 +97,7 @@ Add the following code to the `appsettings.json` file:
In the Razor pages that require authentication, add the `AuthorizeView` component. Let's assume it's the `Home.razor` page:
-```cshtml
+```cshtml title="Pages/Home.razor"
@using Microsoft.AspNetCore.Components.Authorization
@page "/"
@@ -136,7 +121,7 @@ In the Razor pages that require authentication, add the `AuthorizeView` componen
In the `Home.razor.cs` file (create it if it doesn't exist), add the following code:
-```csharp
+```csharp title="Pages/Home.razor.cs"
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Components;
using Microsoft.AspNetCore.Components.Web;
@@ -173,11 +158,19 @@ public partial class Home : ComponentBase
Once the user is authenticated, the `User` property will be populated with the user information.
-### Display user information
+
{props.sampleUrls.origin}
.
-{`using Logto.AspNetCore.Authentication;
-
-var builder = WebApplication.CreateBuilder(args);
-
-builder.Services.AddLogtoAuthentication(options =>
-{
- options.Endpoint = "${props.endpoint}";
- options.AppId = "${props.app.id}";
- options.AppSecret = "${props.app.secret}";
-});
-
-app.UseAuthentication();`}
-
-
-The `AddLogtoAuthentication` method will do the following things:
-
-- Set the default authentication scheme to `LogtoDefaults.CookieScheme`.
-- Set the default challenge scheme to `LogtoDefaults.AuthenticationScheme`.
-- Set the default sign-out scheme to `LogtoDefaults.AuthenticationScheme`.
-- Add cookie and OpenID Connect authentication handlers to the authentication scheme.
+
-First, let's enter your redirect URI. E.g. {props.sampleUrls.origin + 'Callback'}
(replace the endpoint with yours). This is where Logto will redirect users after they sign in.
-
Is authenticated: @User.Identity?.IsAuthenticated
-Sign in -``` - -
-For example, set the URI to {props.sampleUrls.origin + 'SignedOutCallback'}
(replace the endpoint with yours):
-
Is authenticated: @User.Identity?.IsAuthenticated
-@if (User.Identity?.IsAuthenticated == true) -{ +@if (User.Identity?.IsAuthenticated == true) { Sign out } else { Sign in @@ -149,29 +76,13 @@ It will show the "Sign in" link if the user is not authenticated, and show the "
+{`using Logto.AspNetCore.Authentication;
+
+var builder = WebApplication.CreateBuilder(args);
+
+builder.Services.AddLogtoAuthentication(options =>
+{
+ options.Endpoint = "${props.endpoint}";
+ options.AppId = "${props.app.id}";
+ options.AppSecret = "${props.app.secret}";
+});
+
+app.UseAuthentication();`}
+
+
+The `AddLogtoAuthentication` method will do the following things:
+
+- Set the default authentication scheme to `LogtoDefaults.CookieScheme`.
+- Set the default challenge scheme to `LogtoDefaults.AuthenticationScheme`.
+- Set the default sign-out scheme to `LogtoDefaults.AuthenticationScheme`.
+- Add cookie and OpenID Connect authentication handlers to the authentication scheme.
diff --git a/packages/console/src/assets/docs/guides/web-dotnet-core-mvc/fragments/_configure-redirect-uris.mdx b/packages/console/src/assets/docs/guides/web-dotnet-core-mvc/fragments/_configure-redirect-uris.mdx
new file mode 100644
index 000000000..6c1b08209
--- /dev/null
+++ b/packages/console/src/assets/docs/guides/web-dotnet-core-mvc/fragments/_configure-redirect-uris.mdx
@@ -0,0 +1,28 @@
+import UriInputField from '@/mdx-components/UriInputField';
+
+export const defaultBaseUrl = 'http://localhost:5000/';
+
+First, let's configure the **Logto redirect URI**. For example, if your website is hosted on {defaultBaseUrl}
, add {defaultBaseUrl + 'Callback'}
as the redirect URI below:
+
+{defaultBaseUrl + 'SignedOutCallback'}
:
+
+{props.sampleUrls.origin}
.
-{`using Logto.AspNetCore.Authentication;
-
-var builder = WebApplication.CreateBuilder(args);
-
-builder.Services.AddLogtoAuthentication(options =>
-{
- options.Endpoint = "${props.endpoint}";
- options.AppId = "${props.app.id}";
- options.AppSecret = "${props.app.secret}";
-});
-
-app.UseAuthentication();`}
-
-
-The `AddLogtoAuthentication` method will do the following things:
-
-- Set the default authentication scheme to `LogtoDefaults.CookieScheme`.
-- Set the default challenge scheme to `LogtoDefaults.AuthenticationScheme`.
-- Set the default sign-out scheme to `LogtoDefaults.AuthenticationScheme`.
-- Add cookie and OpenID Connect authentication handlers to the authentication scheme.
+
-First, let's enter your redirect URI. E.g. {props.sampleUrls.origin + 'Callback'}
(replace the endpoint with yours). This is where Logto will redirect users after they sign in.
-
Is authenticated: @User.Identity?.IsAuthenticated
- -``` - -
-For example, set the URI to {props.sampleUrls.origin + 'SignedOutCallback'}
(replace the endpoint with yours):
-
Is authenticated: @User.Identity?.IsAuthenticated