6

I have a Web API with authentication enabled (bearer token). This is called by a client application and I want to protect it from anonymous usage so I would like to create a single user and create a bearer token for it.

I can create the token by calling the register and token methods, but I would like to do this from code.

  1. As far as I know, the bearer token is not stored in the database. Can it be retrieved somehow using the ASP.NET Identity API?

  2. I would also like to create this user from code and save the token somewhere because I need to deploy the database to multiple servers.

Useme Alehosaini
  • 2,998
  • 6
  • 18
  • 26
SzilardD
  • 1,611
  • 2
  • 22
  • 40
  • I'd like to see a direct answer to the questions though. I'm doing something similar where I need to generate this token from my integration tests. – Shawn Mclean Mar 10 '15 at 06:37

3 Answers3

6

I do not recommend going with this approach if you have only one client who will talk to your API, my understanding that you need to issue a very very long lived access token maybe for a year and keep using this token to access the back-end API, right? What you will do if this token is stolen? You can't revoke the access token, so it is somehow like your master key (password). My recommendation is to use OAuth refresh tokens along with access tokens. This depends on the type of your client, you can check how this is done here http://bitoftech.net/2014/07/16/enable-oauth-refresh-tokens-angularjs-app-using-asp-net-web-api-2-owin/ The refresh tokens can be revoked and they can expire after a very long time. Let me know if you need further details to implement this.

Useme Alehosaini
  • 2,998
  • 6
  • 18
  • 26
Taiseer Joudeh
  • 8,953
  • 1
  • 41
  • 45
  • 1
    +1 for a good solution and very interesting blog. I haven't tried it, but is it possible to revoke access tokens changing the Security Stamp as this post suggests? http://stackoverflow.com/questions/22755700/revoke-token-generated-by-usertokenprovider-in-asp-net-identity-2-0/22767286#22767286. By the way, thank you for your amazing blog and for being now active on Stackoverflow. – Xavier Egea Sep 12 '14 at 21:16
  • But what if I have an old app with thousands of users using bearer tokens and I just want to give them the possibility to blacklist other sessions? I see no harm storing a hash of a token in the DB and checking every time if a token is blacklisted. But I can't get access to raw token – Toolkit Oct 11 '19 at 10:53
1

Create a Custom Authentication Attribute and store the token hashes for users. A user can have multiple tokens. Then you can let user do what he wants - log out all other sessions when password is changed or remove sessions selectively

  public class CustomAuthAttribute : System.Web.Http.AuthorizeAttribute
    {
        protected override bool IsAuthorized(HttpActionContext context)
        {
            var accessToken = HttpContext.Current.Request.Headers["Authorization"];
            var hash = accessToken.Md5();
            //store the hash for that user 
            //check if the hash is created before the password change or its session was removed by the user
            //store IP address and user agent 
            var isBlackListed = ...
            .....
            return !isBlackListed && base.IsAuthorized(context);

        }
    }
Toolkit
  • 10,779
  • 8
  • 59
  • 68
1

If you're needing to decode the token within a WebAPI Controller function, I found this worked:

String token = Request.Headers.Authorization.Parameter;
Microsoft.Owin.Security.AuthenticationTicket t = Startup.OAuthOptions.AccessTokenFormat.Unprotect(token);
Derek Wade
  • 697
  • 8
  • 11