remember me
This commit is contained in:
parent
dac3acfecf
commit
8629883f88
10 changed files with 278 additions and 96 deletions
|
@ -3,7 +3,8 @@ using System.Text.Encodings.Web;
|
|||
using Femto.Api.Sessions;
|
||||
using Femto.Common;
|
||||
using Femto.Modules.Auth.Application;
|
||||
using Femto.Modules.Auth.Application.Services;
|
||||
using Femto.Modules.Auth.Application.Dto;
|
||||
using Femto.Modules.Auth.Models;
|
||||
using Microsoft.AspNetCore.Authentication;
|
||||
using Microsoft.Extensions.Options;
|
||||
|
||||
|
@ -21,40 +22,13 @@ internal class SessionAuthenticationHandler(
|
|||
{
|
||||
Logger.LogDebug("{TraceId} Authenticating session", this.Context.TraceIdentifier);
|
||||
|
||||
var sessionId = this.Context.GetSessionId();
|
||||
|
||||
if (sessionId is null)
|
||||
{
|
||||
Logger.LogDebug("{TraceId} SessionId was null ", this.Context.TraceIdentifier);
|
||||
return AuthenticateResult.NoResult();
|
||||
}
|
||||
|
||||
var session = await authService.GetSession(sessionId);
|
||||
|
||||
if (session is null)
|
||||
{
|
||||
Logger.LogDebug("{TraceId} Loaded session was null ", this.Context.TraceIdentifier);
|
||||
return await FailAndDeleteSession(sessionId);
|
||||
}
|
||||
|
||||
if (session.IsExpired)
|
||||
{
|
||||
Logger.LogDebug("{TraceId} Loaded session was expired ", this.Context.TraceIdentifier);
|
||||
return await FailAndDeleteSession(sessionId);
|
||||
}
|
||||
|
||||
var user = await authService.GetUserWithId(session.UserId);
|
||||
var user = await this.TryAuthenticateWithSession();
|
||||
|
||||
if (user is null)
|
||||
{
|
||||
return await FailAndDeleteSession(sessionId);
|
||||
}
|
||||
user = await this.TryAuthenticateWithRememberMeToken();
|
||||
|
||||
if (session.ExpiresSoon)
|
||||
{
|
||||
session = await authService.CreateWeakSession(session.UserId);
|
||||
this.Context.SetSession(session, user);
|
||||
}
|
||||
if (user is null)
|
||||
return AuthenticateResult.NoResult();
|
||||
|
||||
var claims = new List<Claim>
|
||||
{
|
||||
|
@ -72,10 +46,77 @@ internal class SessionAuthenticationHandler(
|
|||
return AuthenticateResult.Success(new AuthenticationTicket(principal, this.Scheme.Name));
|
||||
}
|
||||
|
||||
private async Task<AuthenticateResult> FailAndDeleteSession(string sessionId)
|
||||
private async Task<UserInfo?> TryAuthenticateWithSession()
|
||||
{
|
||||
var sessionId = this.Context.GetSessionId();
|
||||
|
||||
if (sessionId is null)
|
||||
{
|
||||
Logger.LogDebug("{TraceId} SessionId was null ", this.Context.TraceIdentifier);
|
||||
return null;
|
||||
}
|
||||
|
||||
var session = await authService.GetSession(sessionId);
|
||||
|
||||
if (session is null)
|
||||
{
|
||||
Logger.LogDebug("{TraceId} Loaded session was null ", this.Context.TraceIdentifier);
|
||||
return null;
|
||||
}
|
||||
|
||||
if (session.IsExpired)
|
||||
{
|
||||
Logger.LogDebug("{TraceId} Loaded session was expired ", this.Context.TraceIdentifier);
|
||||
await authService.DeleteSession(sessionId);
|
||||
this.Context.DeleteSession();
|
||||
return null;
|
||||
}
|
||||
|
||||
var user = await authService.GetUserWithId(session.UserId);
|
||||
|
||||
if (user is null)
|
||||
{
|
||||
await authService.DeleteSession(sessionId);
|
||||
this.Context.DeleteSession();
|
||||
return AuthenticateResult.Fail("invalid session");
|
||||
return null;
|
||||
}
|
||||
|
||||
if (session.ExpiresSoon)
|
||||
{
|
||||
session = await authService.CreateWeakSession(session.UserId);
|
||||
this.Context.SetSession(session, user);
|
||||
}
|
||||
|
||||
return user;
|
||||
}
|
||||
|
||||
private async Task<UserInfo?> TryAuthenticateWithRememberMeToken()
|
||||
{
|
||||
/*
|
||||
* load remember me from token
|
||||
* if it is null, return null
|
||||
* if it exists, validate it
|
||||
* if it is valid, create a new weak session, return the user
|
||||
* if it is almost expired, refresh it
|
||||
*/
|
||||
|
||||
var rememberMeToken = this.Context.GetRememberMeToken();
|
||||
|
||||
if (rememberMeToken is null)
|
||||
return null;
|
||||
|
||||
var (user, newRememberMeToken) = await authService.GetUserWithRememberMeToken(rememberMeToken);
|
||||
|
||||
if (user is null)
|
||||
return null;
|
||||
|
||||
var session = await authService.CreateWeakSession(user.Id);
|
||||
|
||||
this.Context.SetSession(session, user);
|
||||
|
||||
if (newRememberMeToken is not null)
|
||||
this.Context.SetRememberMeToken(newRememberMeToken);
|
||||
|
||||
return user;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
using Femto.Api.Sessions;
|
||||
using Femto.Common;
|
||||
using Femto.Modules.Auth.Application.Services;
|
||||
using Femto.Modules.Auth.Application;
|
||||
using Femto.Modules.Auth.Contracts;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
|
@ -18,10 +18,9 @@ public class AuthController(ICurrentUserContext currentUserContext, IAuthService
|
|||
CancellationToken cancellationToken
|
||||
)
|
||||
{
|
||||
var result = await authService.GetUserWithCredentials(
|
||||
var result = await authService.AuthenticateUserCredentials(
|
||||
request.Username,
|
||||
request.Password,
|
||||
request.RememberMe,
|
||||
cancellationToken
|
||||
);
|
||||
|
||||
|
@ -32,21 +31,33 @@ public class AuthController(ICurrentUserContext currentUserContext, IAuthService
|
|||
|
||||
HttpContext.SetSession(session, user);
|
||||
|
||||
if (request.RememberMe)
|
||||
{
|
||||
var newRememberMeToken = await authService.CreateRememberMeToken(user.Id);
|
||||
HttpContext.SetRememberMeToken(newRememberMeToken);
|
||||
}
|
||||
|
||||
return new LoginResponse(user.Id, user.Username, user.Roles.Any(r => r == Role.SuperUser));
|
||||
}
|
||||
|
||||
[HttpPost("register")]
|
||||
public async Task<ActionResult<RegisterResponse>> Register([FromBody] RegisterRequest request)
|
||||
public async Task<ActionResult<RegisterResponse>> Register([FromBody] RegisterRequest request, CancellationToken cancellationToken)
|
||||
{
|
||||
var (user, session) = await authService.CreateUserWithCredentials(
|
||||
request.Username,
|
||||
request.Password,
|
||||
request.SignupCode,
|
||||
request.RememberMe
|
||||
cancellationToken
|
||||
);
|
||||
|
||||
HttpContext.SetSession(session, user);
|
||||
|
||||
if (request.RememberMe)
|
||||
{
|
||||
var newRememberMeToken = await authService.CreateRememberMeToken(user.Id);
|
||||
HttpContext.SetRememberMeToken(newRememberMeToken);
|
||||
}
|
||||
|
||||
return new RegisterResponse(
|
||||
user.Id,
|
||||
user.Username,
|
||||
|
@ -65,6 +76,14 @@ public class AuthController(ICurrentUserContext currentUserContext, IAuthService
|
|||
HttpContext.DeleteSession();
|
||||
}
|
||||
|
||||
var rememberMeToken = HttpContext.GetRememberMeToken();
|
||||
|
||||
if (rememberMeToken is not null)
|
||||
{
|
||||
await authService.DeleteRememberMeToken(rememberMeToken);
|
||||
HttpContext.DeleteRememberMeToken();
|
||||
}
|
||||
|
||||
return Ok(new { });
|
||||
}
|
||||
|
||||
|
|
|
@ -15,18 +15,12 @@ internal static class HttpContextSessionExtensions
|
|||
PropertyNamingPolicy = JsonNamingPolicy.CamelCase,
|
||||
};
|
||||
|
||||
public static string? GetSessionId(this HttpContext httpContext)
|
||||
{
|
||||
var sessionId = httpContext.Request.Cookies["sid"];
|
||||
|
||||
return sessionId;
|
||||
}
|
||||
public static string? GetSessionId(this HttpContext httpContext) =>
|
||||
httpContext.Request.Cookies["sid"];
|
||||
|
||||
public static void SetSession(this HttpContext context, Session session, UserInfo user)
|
||||
{
|
||||
var cookieSettings = context.RequestServices.GetRequiredService<
|
||||
IOptions<CookieSettings>
|
||||
>();
|
||||
var cookieSettings = context.RequestServices.GetRequiredService<IOptions<CookieSettings>>();
|
||||
|
||||
context.Response.Cookies.Append(
|
||||
"sid",
|
||||
|
@ -91,4 +85,47 @@ internal static class HttpContextSessionExtensions
|
|||
}
|
||||
);
|
||||
}
|
||||
|
||||
|
||||
public static RememberMeToken? GetRememberMeToken(this HttpContext httpContext) =>
|
||||
httpContext.Request.Cookies["rid"] is { } code ? RememberMeToken.FromCode(code) : null;
|
||||
|
||||
public static void SetRememberMeToken(this HttpContext context, NewRememberMeToken token)
|
||||
{
|
||||
var cookieSettings = context.RequestServices.GetRequiredService<IOptions<CookieSettings>>();
|
||||
|
||||
context.Response.Cookies.Append(
|
||||
"rid",
|
||||
token.Code,
|
||||
new CookieOptions
|
||||
{
|
||||
Path = "/",
|
||||
IsEssential = true,
|
||||
Domain = cookieSettings.Value.Domain,
|
||||
HttpOnly = true,
|
||||
Secure = cookieSettings.Value.Secure,
|
||||
SameSite = cookieSettings.Value.SameSite,
|
||||
Expires = token.Expires,
|
||||
}
|
||||
);
|
||||
}
|
||||
|
||||
public static void DeleteRememberMeToken(this HttpContext context)
|
||||
{
|
||||
var cookieSettings = context.RequestServices.GetRequiredService<IOptions<CookieSettings>>();
|
||||
|
||||
context.Response.Cookies.Delete(
|
||||
"rid",
|
||||
new CookieOptions
|
||||
{
|
||||
Path = "/",
|
||||
HttpOnly = true,
|
||||
Domain = cookieSettings.Value.Domain,
|
||||
IsEssential = true,
|
||||
Secure = cookieSettings.Value.Secure,
|
||||
SameSite = cookieSettings.Value.SameSite,
|
||||
Expires = DateTimeOffset.UtcNow.AddDays(-1),
|
||||
}
|
||||
);
|
||||
}
|
||||
}
|
||||
|
|
|
@ -7,7 +7,7 @@ using Femto.Modules.Auth.Infrastructure;
|
|||
using Femto.Modules.Auth.Models;
|
||||
using Microsoft.EntityFrameworkCore;
|
||||
|
||||
namespace Femto.Modules.Auth.Application.Services;
|
||||
namespace Femto.Modules.Auth.Application;
|
||||
|
||||
internal class AuthService(
|
||||
AuthContext context,
|
||||
|
@ -15,10 +15,11 @@ internal class AuthService(
|
|||
IDbConnectionFactory connectionFactory
|
||||
) : IAuthService
|
||||
{
|
||||
public async Task<UserAndSession?> GetUserWithCredentials(string username,
|
||||
public async Task<UserAndSession?> AuthenticateUserCredentials(
|
||||
string username,
|
||||
string password,
|
||||
bool createLongTermSession,
|
||||
CancellationToken cancellationToken = default)
|
||||
CancellationToken cancellationToken = default
|
||||
)
|
||||
{
|
||||
var user = await context
|
||||
.Users.Where(u => u.Username == username)
|
||||
|
@ -48,7 +49,7 @@ internal class AuthService(
|
|||
.SingleOrDefaultAsync(cancellationToken);
|
||||
}
|
||||
|
||||
public async Task<Session> CreateStrongSession(Guid userId)
|
||||
public async Task<Session> CreateNewSession(Guid userId)
|
||||
{
|
||||
var session = new Session(userId, true);
|
||||
|
||||
|
@ -76,11 +77,12 @@ internal class AuthService(
|
|||
await storage.DeleteSession(sessionId);
|
||||
}
|
||||
|
||||
public async Task<UserAndSession> CreateUserWithCredentials(string username,
|
||||
public async Task<UserAndSession> CreateUserWithCredentials(
|
||||
string username,
|
||||
string password,
|
||||
string signupCode,
|
||||
bool createLongTermSession,
|
||||
CancellationToken cancellationToken = default)
|
||||
CancellationToken cancellationToken = default
|
||||
)
|
||||
{
|
||||
var now = DateTimeOffset.UtcNow;
|
||||
|
||||
|
@ -166,24 +168,61 @@ internal class AuthService(
|
|||
.ToList();
|
||||
}
|
||||
|
||||
public async Task<LongTermSession> CreateLongTermSession(Guid userId, bool isStrong)
|
||||
public async Task<NewRememberMeToken> CreateRememberMeToken(Guid userId)
|
||||
{
|
||||
throw new NotImplementedException();
|
||||
var (rememberMeToken, verifier) = LongTermSession.Create(userId);
|
||||
|
||||
await context.AddAsync(rememberMeToken);
|
||||
await context.SaveChangesAsync();
|
||||
|
||||
return new(rememberMeToken.Selector, verifier, rememberMeToken.Expires);
|
||||
}
|
||||
|
||||
public async Task<LongTermSession> DeleteLongTermSession(string sessionId)
|
||||
public async Task<(UserInfo?, NewRememberMeToken?)> GetUserWithRememberMeToken(
|
||||
RememberMeToken rememberMeToken
|
||||
)
|
||||
{
|
||||
throw new NotImplementedException();
|
||||
var token = await context.LongTermSessions.SingleOrDefaultAsync(t =>
|
||||
t.Selector == rememberMeToken.Selector
|
||||
);
|
||||
|
||||
if (token is null)
|
||||
return (null, null);
|
||||
|
||||
if (!token.Validate(rememberMeToken.Verifier))
|
||||
return (null, null);
|
||||
|
||||
var user = await context.Users.SingleOrDefaultAsync(u => u.Id == token.UserId);
|
||||
|
||||
if (user is null)
|
||||
return (null, null);
|
||||
|
||||
if (token.ExpiresSoon)
|
||||
{
|
||||
var (newToken, verifier) = LongTermSession.Create(user.Id);
|
||||
await context.AddAsync(newToken);
|
||||
await context.SaveChangesAsync();
|
||||
|
||||
return (new(user), new(newToken.Selector, verifier, newToken.Expires));
|
||||
}
|
||||
|
||||
public async Task<LongTermSession> RefreshLongTermSession(string sessionId)
|
||||
{
|
||||
throw new NotImplementedException();
|
||||
return (new(user), null);
|
||||
}
|
||||
|
||||
public async Task<ValidateSessionResult> ValidateLongTermSession(string sessionId)
|
||||
public async Task DeleteRememberMeToken(RememberMeToken rememberMeToken)
|
||||
{
|
||||
throw new NotImplementedException();
|
||||
var session = await context.LongTermSessions.SingleOrDefaultAsync(s =>
|
||||
s.Selector == rememberMeToken.Selector
|
||||
);
|
||||
|
||||
if (session is null)
|
||||
return;
|
||||
|
||||
if (!session.Validate(rememberMeToken.Verifier))
|
||||
return;
|
||||
|
||||
context.Remove(session);
|
||||
await context.SaveChangesAsync();
|
||||
}
|
||||
|
||||
private class GetSignupCodesQueryResultRow
|
|
@ -3,7 +3,6 @@ using Femto.Common.Infrastructure;
|
|||
using Femto.Common.Infrastructure.DbConnection;
|
||||
using Femto.Common.Infrastructure.Outbox;
|
||||
using Femto.Common.Integration;
|
||||
using Femto.Modules.Auth.Application.Services;
|
||||
using Femto.Modules.Auth.Data;
|
||||
using Femto.Modules.Auth.Infrastructure;
|
||||
using MediatR;
|
||||
|
|
18
Femto.Modules.Auth/Application/Dto/RememberMeToken.cs
Normal file
18
Femto.Modules.Auth/Application/Dto/RememberMeToken.cs
Normal file
|
@ -0,0 +1,18 @@
|
|||
using Femto.Modules.Auth.Models;
|
||||
|
||||
namespace Femto.Modules.Auth.Application.Dto;
|
||||
|
||||
public record RememberMeToken(string Selector, string Verifier)
|
||||
{
|
||||
public static RememberMeToken FromCode(string code)
|
||||
{
|
||||
var parts = code.Split('.');
|
||||
return new RememberMeToken(parts[0], parts[1]);
|
||||
}
|
||||
|
||||
};
|
||||
|
||||
public record NewRememberMeToken(string Selector, string Verifier, DateTimeOffset Expires)
|
||||
{
|
||||
public string Code => $"{Selector}.{Verifier}";
|
||||
}
|
|
@ -1,7 +1,7 @@
|
|||
using Femto.Modules.Auth.Application.Dto;
|
||||
using Femto.Modules.Auth.Models;
|
||||
|
||||
namespace Femto.Modules.Auth.Application.Services;
|
||||
namespace Femto.Modules.Auth.Application;
|
||||
|
||||
/// <summary>
|
||||
/// I broke off IAuthService from IAuthModule because the CQRS distinction is cumbersome when doing auth handling,
|
||||
|
@ -11,17 +11,16 @@ namespace Femto.Modules.Auth.Application.Services;
|
|||
/// </summary>
|
||||
public interface IAuthService
|
||||
{
|
||||
public Task<UserAndSession?> GetUserWithCredentials(
|
||||
public Task<UserAndSession?> AuthenticateUserCredentials(
|
||||
string username,
|
||||
string password,
|
||||
bool createLongTermSession,
|
||||
CancellationToken cancellationToken = default
|
||||
);
|
||||
public Task<UserInfo?> GetUserWithId(
|
||||
Guid? userId,
|
||||
CancellationToken cancellationToken = default
|
||||
);
|
||||
public Task<Session> CreateStrongSession(Guid userId);
|
||||
public Task<Session> CreateNewSession(Guid userId);
|
||||
public Task<Session> CreateWeakSession(Guid userId);
|
||||
public Task<Session?> GetSession(string sessionId);
|
||||
public Task DeleteSession(string sessionId);
|
||||
|
@ -29,7 +28,6 @@ public interface IAuthService
|
|||
public Task<UserAndSession> CreateUserWithCredentials(string username,
|
||||
string password,
|
||||
string signupCode,
|
||||
bool createLongTermSession,
|
||||
CancellationToken cancellationToken = default);
|
||||
|
||||
public Task AddSignupCode(
|
||||
|
@ -41,6 +39,10 @@ public interface IAuthService
|
|||
public Task<ICollection<SignupCodeDto>> GetSignupCodes(
|
||||
CancellationToken cancellationToken = default
|
||||
);
|
||||
|
||||
Task<NewRememberMeToken> CreateRememberMeToken(Guid userId);
|
||||
Task<(UserInfo?, NewRememberMeToken?)> GetUserWithRememberMeToken(RememberMeToken rememberMeToken);
|
||||
Task DeleteRememberMeToken(RememberMeToken rememberMeToken);
|
||||
}
|
||||
|
||||
public record UserAndSession(UserInfo User, Session Session);
|
|
@ -0,0 +1,13 @@
|
|||
using Femto.Modules.Auth.Models;
|
||||
using Microsoft.EntityFrameworkCore;
|
||||
using Microsoft.EntityFrameworkCore.Metadata.Builders;
|
||||
|
||||
namespace Femto.Modules.Auth.Data.Configurations;
|
||||
|
||||
public class LongTermSessionConfiguration : IEntityTypeConfiguration<LongTermSession>
|
||||
{
|
||||
public void Configure(EntityTypeBuilder<LongTermSession> builder)
|
||||
{
|
||||
builder.ToTable("long_term_session");
|
||||
}
|
||||
}
|
|
@ -1,3 +1,4 @@
|
|||
using System.ComponentModel.DataAnnotations.Schema;
|
||||
using System.Text;
|
||||
using static System.Security.Cryptography.RandomNumberGenerator;
|
||||
|
||||
|
@ -6,6 +7,7 @@ namespace Femto.Modules.Auth.Models;
|
|||
public class LongTermSession
|
||||
{
|
||||
private static TimeSpan TokenTimeout { get; } = TimeSpan.FromDays(90);
|
||||
private static TimeSpan RefreshBuffer { get; } = TimeSpan.FromDays(5);
|
||||
|
||||
public int Id { get; private set; }
|
||||
|
||||
|
@ -17,11 +19,18 @@ public class LongTermSession
|
|||
|
||||
public Guid UserId { get; private set; }
|
||||
|
||||
[NotMapped]
|
||||
public bool ExpiresSoon => this.Expires < DateTimeOffset.UtcNow + RefreshBuffer;
|
||||
|
||||
private LongTermSession() { }
|
||||
|
||||
public static (LongTermSession, string) Create(Guid userId)
|
||||
{
|
||||
var selector = GetString("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789", 12);
|
||||
var selector = GetString(
|
||||
"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789",
|
||||
12
|
||||
);
|
||||
|
||||
var verifier = GetString("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789", 32);
|
||||
|
||||
using var sha256 = System.Security.Cryptography.SHA256.Create();
|
||||
|
@ -29,14 +38,12 @@ public class LongTermSession
|
|||
var longTermSession = new LongTermSession
|
||||
{
|
||||
Selector = selector,
|
||||
HashedVerifier = sha256.ComputeHash(Encoding.UTF8.GetBytes(verifier)),
|
||||
HashedVerifier = ComputeHash(verifier),
|
||||
UserId = userId,
|
||||
Expires = DateTimeOffset.UtcNow + TokenTimeout
|
||||
Expires = DateTimeOffset.UtcNow + TokenTimeout,
|
||||
};
|
||||
|
||||
var rememberMeToken = $"{selector}.{verifier}";
|
||||
|
||||
return (longTermSession, rememberMeToken);
|
||||
return (longTermSession, verifier);
|
||||
}
|
||||
|
||||
public bool Validate(string verifier)
|
||||
|
@ -44,8 +51,13 @@ public class LongTermSession
|
|||
if (this.Expires < DateTimeOffset.UtcNow)
|
||||
return false;
|
||||
|
||||
return ComputeHash(verifier).SequenceEqual(this.HashedVerifier);
|
||||
}
|
||||
|
||||
private static byte[] ComputeHash(string verifier)
|
||||
{
|
||||
using var sha256 = System.Security.Cryptography.SHA256.Create();
|
||||
var hashedVerifier = sha256.ComputeHash(Encoding.UTF8.GetBytes(verifier));
|
||||
return hashedVerifier.SequenceEqual(this.HashedVerifier);
|
||||
return hashedVerifier;
|
||||
}
|
||||
}
|
|
@ -4,11 +4,13 @@ namespace Femto.Modules.Auth.Models;
|
|||
|
||||
public class Session(Guid userId, bool isStrong)
|
||||
{
|
||||
private static readonly TimeSpan ValidityPeriod = TimeSpan.FromSeconds(5);
|
||||
private static readonly TimeSpan RefreshBuffer = TimeSpan.FromMinutes(0);
|
||||
public string Id { get; } = Convert.ToBase64String(GetBytes(32));
|
||||
public Guid UserId { get; } = userId;
|
||||
public DateTimeOffset Expires { get; } = DateTimeOffset.UtcNow + TimeSpan.FromMinutes(15);
|
||||
public DateTimeOffset Expires { get; } = DateTimeOffset.UtcNow + ValidityPeriod;
|
||||
|
||||
public bool ExpiresSoon => this.Expires < DateTimeOffset.UtcNow + TimeSpan.FromMinutes(5);
|
||||
public bool ExpiresSoon => this.Expires < DateTimeOffset.UtcNow + RefreshBuffer;
|
||||
public bool IsStronglyAuthenticated { get; } = isStrong;
|
||||
public bool IsExpired => this.Expires < DateTimeOffset.UtcNow;
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue