Skip to content

Commit 8959b8b

Browse files
committed
sfi updates
1 parent 3130b69 commit 8959b8b

File tree

11 files changed

+36
-6
lines changed

11 files changed

+36
-6
lines changed

aspnetcore/migration/identity.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@ title: Migrate Authentication and Identity to ASP.NET Core
33
author: ardalis
44
description: Learn how to migrate authentication and identity from an ASP.NET MVC project to an ASP.NET Core MVC project.
55
ms.author: riande
6-
ms.date: 3/22/2020
6+
ms.date: 10/29/2024
77
uid: migration/identity
88
---
9+
<!-- ms.sfi.ropc: t -->
910
# Migrate Authentication and Identity to ASP.NET Core
1011

1112
By [Steve Smith](https://ardalis.com/)
@@ -22,6 +23,8 @@ Install the following NuGet packages:
2223
* `Microsoft.AspNetCore.Authentication.Cookies`
2324
* `Microsoft.EntityFrameworkCore.SqlServer`
2425

26+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
27+
2528
In `Startup.cs`, update the `Startup.ConfigureServices` method to use Entity Framework and Identity services:
2629

2730
```csharp

aspnetcore/migration/proper-to-2x/membership-to-core-identity.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ ms.custom: mvc
77
ms.date: 01/10/2019
88
uid: migration/proper-to-2x/membership-to-core-identity
99
---
10+
<!-- ms.sfi.ropc: t -->
1011
# Migrate from ASP.NET Membership authentication to ASP.NET Core 2.0 Identity
1112

1213
By [Isaac Levin](https://isaaclevin.com)
@@ -49,6 +50,8 @@ The fastest way to view the schema for ASP.NET Core 2.0 Identity is to create a
4950
}
5051
```
5152

53+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
54+
5255
1. Select **View** > **SQL Server Object Explorer**. Expand the node corresponding to the database name specified in the `ConnectionStrings:DefaultConnection` property of `appsettings.json`.
5356

5457
The `Update-Database` command created the database specified with the schema and any data needed for app initialization. The following image depicts the table structure that's created with the preceding steps.

aspnetcore/security/app-secrets.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,10 @@ description: Learn how to store and retrieve sensitive information during the de
55
ms.author: tdykstra
66
monikerRange: '>= aspnetcore-3.0'
77
ms.custom: mvc
8-
ms.date: 02/23/2024
8+
ms.date: 10/29/2024
99
uid: security/app-secrets
1010
---
11+
<!-- ms.sfi.ropc: t -->
1112
# Safe storage of app secrets in development in ASP.NET Core
1213

1314
[!INCLUDE[](~/includes/not-latest-version.md)]

aspnetcore/security/app-secrets/includes/app-secrets-3-5.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
11
:::moniker range="< aspnetcore-6.0"
2+
<!-- ms.sfi.ropc: t -->
23

34
By [Rick Anderson](https://twitter.com/RickAndMSFT), [Kirk Larkin](https://twitter.com/serpent5), [Daniel Roth](https://github.com/danroth27), and [Scott Addie](https://github.com/scottaddie)
45

56
[View or download sample code](https://github.com/dotnet/AspNetCore.Docs/tree/main/aspnetcore/security/app-secrets/samples) ([how to download](xref:index#how-to-download-a-sample))
67

7-
This document explains how to manage sensitive data for an ASP.NET Core app on a development machine. Never store passwords or other sensitive data in source code. Production secrets shouldn't be used for development or test. Secrets shouldn't be deployed with the app. Instead, production secrets should be accessed through a controlled means like environment variables or Azure Key Vault. You can store and protect Azure test and production secrets with the [Azure Key Vault configuration provider](xref:security/key-vault-configuration).
8+
This article explains how to manage sensitive data for an ASP.NET Core app on a development machine. Never store passwords or other sensitive data in source code or configuration files. Production secrets shouldn't be used for development or test. Secrets shouldn't be deployed with the app. Production secrets should be accessed through a controlled means like Azure Key Vault. Azure test and production secrets can be stored and protected with the [Azure Key Vault configuration provider](xref:security/key-vault-configuration).
89

10+
For more information on authentication for test and production environments, see [Secure authentication flows](xref:security/index#secure-authentication-flows).
911
## Environment variables
1012

1113
Environment variables are used to avoid storage of app secrets in code or in local configuration files. Environment variables override configuration values for all previously specified configuration sources.

aspnetcore/security/authentication/customize-identity-model.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@ title: Identity model customization in ASP.NET Core
33
author: ajcvickers
44
description: This article describes how to customize the underlying Entity Framework Core data model for ASP.NET Core Identity.
55
ms.author: avickers
6-
ms.date: 07/01/2019
6+
ms.date: 10/29/2024
77
uid: security/authentication/customize_identity_model
88
---
9+
<!-- ms.sfi.ropc: t -->
910
# Identity model customization in ASP.NET Core
1011

1112
By [Arthur Vickers](https://github.com/ajcvickers)
@@ -887,6 +888,8 @@ services
887888

888889
Refer to the preceding examples for guidance on adding navigation properties to the entity types.
889890

891+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
892+
890893
## Additional resources
891894

892895
* <xref:security/authentication/scaffold-identity>

aspnetcore/security/authentication/identity-api-authorization/includes/identity-api-authorization3-7.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
:::moniker range=">= aspnetcore-6.0 < aspnetcore-8.0"
2+
<!-- ms.sfi.ropc: t -->
23

34
The ASP.NET Core templates offer authentication in Single Page Apps (SPAs) using the support for API authorization. ASP.NET Core Identity for authenticating and storing users is combined with [Duende Identity Server](https://docs.duendesoftware.com) for implementing OpenID Connect.
45

@@ -76,6 +77,8 @@ The preceding code configures:
7677
app.UseIdentityServer();
7778
```
7879

80+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
81+
7982
### Azure App Service on Linux
8083

8184
For Azure App Service deployments on Linux, specify the issuer explicitly:
@@ -484,6 +487,8 @@ The `Startup` class has the following additions:
484487
app.UseIdentityServer();
485488
```
486489

490+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
491+
487492
### Azure App Service on Linux
488493

489494
For Azure App Service deployments on Linux, specify the issuer explicitly in `Startup.ConfigureServices`:

aspnetcore/security/authentication/identity-custom-storage-providers.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,10 @@ author: ardalis
44
description: Learn how to configure custom storage providers for ASP.NET Core Identity.
55
ms.author: riande
66
ms.custom: mvc
7-
ms.date: 07/23/2019
7+
ms.date: 10/29/2024
88
uid: security/authentication/identity-custom-storage-providers
99
---
10+
<!-- ms.sfi.ropc: t -->
1011
# Custom storage providers for ASP.NET Core Identity
1112

1213
By [Steve Smith](https://ardalis.com/)
@@ -207,6 +208,8 @@ Once you have implemented a storage provider, you configure your app to use it.
207208
1. If you are using Roles, update the `RoleManager` to use your `RoleStore` class.
208209
1. Update the connection string and credentials to your app's configuration.
209210

211+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
212+
210213
Example:
211214

212215
:::moniker range="< aspnetcore-6.0"

aspnetcore/security/authentication/mfa.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,10 @@ description: Learn how to set up multi-factor authentication (MFA) in an ASP.NET
55
monikerRange: '>= aspnetcore-3.1'
66
ms.author: riande
77
ms.custom: mvc
8-
ms.date: 04/02/2024
8+
ms.date: 10/29/2024
99
uid: security/authentication/mfa
1010
---
11+
<!-- ms.sfi.ropc: t -->
1112
# Multi-factor authentication in ASP.NET Core
1213

1314
[!INCLUDE[](~/includes/not-latest-version.md)]
@@ -73,6 +74,8 @@ MFA could be forced on users to access sensitive pages within an ASP.NET Core Id
7374

7475
The demo code is setup using ASP.NET Core with Identity and Razor Pages. The `AddIdentity` method is used instead of `AddDefaultIdentity` one, so an `IUserClaimsPrincipalFactory` implementation can be used to add claims to the identity after a successful login.
7576

77+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
78+
7679
```csharp
7780
builder.Services.AddDbContext<ApplicationDbContext>(options =>
7881
options.UseSqlite(

aspnetcore/security/authentication/mfa/includes/mfa-5-8.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,8 @@ MFA could be forced on users to access sensitive pages within an ASP.NET Core Id
5959

6060
The demo code is setup using ASP.NET Core with Identity and Razor Pages. The `AddIdentity` method is used instead of `AddDefaultIdentity` one, so an `IUserClaimsPrincipalFactory` implementation can be used to add claims to the identity after a successful login.
6161

62+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
63+
6264
```csharp
6365
builder.Services.AddDbContext<ApplicationDbContext>(options =>
6466
options.UseSqlite(
@@ -561,6 +563,8 @@ MFA could be forced on users to access sensitive pages within an ASP.NET Core Id
561563

562564
The demo code is setup using ASP.NET Core with Identity and Razor Pages. The `AddIdentity` method is used instead of `AddDefaultIdentity` one, so an `IUserClaimsPrincipalFactory` implementation can be used to add claims to the identity after a successful login.
563565

566+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
567+
564568
```csharp
565569
public void ConfigureServices(IServiceCollection services)
566570
{

aspnetcore/security/data-protection/implementation/key-storage-providers.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ public void ConfigureServices(IServiceCollection services)
4343

4444
If the web app is running as an Azure service, connection string can be used to authenticate to Azure storage by using [Azure.Storage.Blobs](xref:Azure.Storage.Blobs.BlobContainerClient).
4545

46+
[!INCLUDE [managed-identities](~/includes/managed-identities-conn-strings.md)]
47+
4648
```csharp
4749
string connectionString = "<connection_string>";
4850
string containerName = "my-key-container";

0 commit comments

Comments
 (0)