The samples for FoxIDs show login and logout with OAuth 2.0, OpenID Connect 1.0, SAML 2.0 and API call with OAuth 2.0. The samples is located in the FoxIDs.Samples repository.
The samples need a FoxIDs track to run. The samples are configured in the FoxIDs.com test track, or you can configure the samples in your one FoxIDs track.
The samples can be run locally in Visual Studio on the configured localhost ports. All sample applications will open in a browser tap except the API sample.
The sample Visual Studio solution contain the following sample applications.
Sample application showing login and logout with OpenID Connect (OIDC) using authorization code flow as a service provider.
Show how to call the API sample secured with an access token.
Support login/(logout) with FoxIDs login page, SAML 2.0 IdP sample and if configured AD FS using SAML 2.0.
Local development domain and port: https://localhost:44340
Sample application showing login and logout with OpenID Connect (OIDC) using implicit flow as a service provider.
Support login/(logout) with FoxIDs login page, SAML 2.0 IdP sample and if configured AD FS using SAML 2.0.
Local development domain and port: https://localhost:44341
Sample application implementing a SAML 2.0 identity provider (IdP) making it possible to configure at sample SAML 2.0 IdP in the FoxIDs track.
Local development domain and port: https://localhost:44342
Sample application showing login and logout with SAML 2.0 as a relying party.
Support login/(logout) with FoxIDs login page, SAML 2.0 IdP sample and if configured AD FS using SAML 2.0.
Local development domain and port: https://localhost:44343
Sample API showing how to secure an API with an access token and how to restrict access by a scope.
Local development domain and port: https://localhost:44344
Blazor sample application showing login and logout with OpenID Connect (OIDC) using authorization code flow and PKCE as a service provider.
Show how to call the API sample secured with an access token.
Local development domain and port: https://localhost:44345
//TODO
The samples can be configured in a FoxIDs track with the sample seed tool or manually through the FoxIDs Control Client.
The sample seed tool is found in the sample solution: tools/SampleSeedTool.
The sample seed tool is configured in the
appsettings.json
file.
Add the FoxIDs and FoxIDs Control API endpoints to the sample seed tool configuration. They can be added by updating the instance names foxidsxxxx
and foxidsconsolxxxx
or by configuring custom domains. Or if you are running FoxIDs locally in Visual Studio by configuring FoxIDs localhost https://localhost:44330/
and FoxIDs Control API localhost https://localhost:44331/
.
"SeedSettings": {
"FoxIDsEndpoint": "https://foxidsxxxx.azurewebsites.net",
"FoxIDsConsolApiEndpoint": "https://foxidsconsolxxxx.azurewebsites.net/api"
}
Create the sample seed OAuth 2.0 client in the FoxIDs Control Client:
sample_seed
, redirect Uri to uri:sample:seed:client
) and response type to token
. Add a client secret and Remember the secret.foxids_control_api
with the scope foxids:tenant
.foxids:tenant.admin
.The sample seed client is thereby granted access to update the tenant.
Create a new FoxIDs track for the sample applications or select an existing track.
Change the tenant, the track and the sample seed tool client secret in the sample seed tool configured.
"SeedSettings": {
"Tenant": "xxx",
"Track": "xxx",
"DownParty": "sample_seed",
"RedirectUri": "uri:sample:seed:client",
"ClientSecret": "xxx"
}
Change the tenant and the track configuration for all the samples.
Run the sample seed tool executable SampleSeedTool.exe or run the seed tool directly from Visual Studio.
The sample seed tool will create and delete configurations for all samples.
The sample applications require a login up-party with the name login
(handles user login). It is created by the sample seed tool if it do not exists. The login up-party is not deleted if the sample configuration is deleted.