Skip to content

Commit 926dd07

Browse files
committed
Update ASP.NET Core 6.0 integration guide text for consistency with other integration guides (mostly ASP.NET Core 3.1)
1 parent 5b1aaba commit 926dd07

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

src/pages/verify/integrations/aspnet-core-v6.mdx

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,23 +9,23 @@ subtitle: Accept MitID, Swedish BankID, Norwegian BankID and other eID logins wi
99
This tutorial demonstrates how to integrate Criipto Verify into a fresh ASP.NET Core 6.0 application created with `dotnet new mvc`.
1010
The principles should apply to any ASP.NET Core 6.0 application.
1111

12-
You can download a [sample application from GitHub](https://github.com/criipto/samples/tree/master/Verify/dotnet-core-v6.x)
12+
You can download a [sample application from GitHub](https://github.com/criipto/samples/tree/master/Verify/dotnet-core-v6.x).
1313

1414
## Register Your Application in Criipto Verify
1515

1616
After you signed up for Criipto Verify, you must [register an application](https://dashboard.criipto.com/applications/add) before you can actually try logging in with any eID.
1717

18-
Once you register your application you will also need some of the information for communicating with Criipto Verify. You get these details from the settings of the application in the dashboard.
18+
Once you register your application, you will also need some of the information for communicating with Criipto Verify. You get these details from the application settings in the dashboard.
1919

2020
Specifically you need the following information to configure you application
2121

2222
- _Client ID_ to identify you application to Criipto Verify.
23-
- _Domain_ on which you will be communicating with Criipto Verify.
23+
- _[Domain](/verify/getting-started/basics/#domains)_ on which you will be communicating with Criipto Verify.
2424
- _Client Secret_ to perform code exchange.
2525

2626
### Register callback URLs
2727

28-
Before you can start sending authentication requests to Criipto Verify you need to register the URLs on which you want to receive the returned *JSON Web Token*, JWT.
28+
Before you can start sending authentication requests to Criipto Verify, you need to register the URLs on which you want to receive the returned *JSON Web Token*, JWT.
2929

3030
The Callback URL of your application is the URL where Criipto Verify will redirect to after the user has authenticated in order for the OpenID Connect ASP.NET middleware to complete the authentication process.
3131

@@ -38,9 +38,9 @@ https://localhost:5001/signout
3838
http://localhost:5000/signout
3939
```
4040

41-
If you deploy your application to a different URL you will also need to ensure to add that URL to the Callback URLs.
41+
If you deploy your application to a different URL, you will need to add that URL to the Callback URLs as well.
4242

43-
## Configure the OAuth2 code flow
43+
## Configure OAuth2 code flow
4444

4545
import CodeFlowSnippet from '../../../snippets/oauth2-code-flow.mdx';
4646

@@ -102,7 +102,7 @@ builder.Services.AddAuthentication(options => {
102102
});
103103
```
104104

105-
You can have a look at our [sample Program.cs](https://github.com/criipto/samples/blob/master/Verify/dotnet-core-v6.x/Program.cs) to see how it fits together with the rest of Program.cs
105+
You can have a look at our [sample Program.cs](https://github.com/criipto/samples/blob/master/Verify/dotnet-core-v6.x/Program.cs) to see how it fits together with the rest of `Program.cs`.
106106

107107
### Enable the OpenID Connect middleware
108108

@@ -116,7 +116,7 @@ app.UseAuthorization();
116116

117117
```
118118

119-
You can have a look at our [sample Program.cs](https://github.com/criipto/samples/blob/master/Verify/dotnet-core-v6.x/Program.cs) to see how it fits together with the rest of Program.cs
119+
You can have a look at our [sample Program.cs](https://github.com/criipto/samples/blob/master/Verify/dotnet-core-v6.x/Program.cs) to see how it fits together with the rest of `Program.cs`.
120120

121121
## Trigger Login and Logout in Your Application
122122

@@ -153,19 +153,19 @@ public async Task Logout()
153153

154154
## The runtime flow
155155

156-
In summary, the steps above will lead to a runtime flow looks like this:
156+
In summary, the steps above will lead to a runtime flow that looks like this:
157157

158-
1. The web server starts the application which configures and initializes the OpenID Connect middleware. The middleware is configured with a URL from which it retrieves the metadata describing the various endpoints and encryption keys, such as the token and userinfo endpoints as well the token signing certificates
159-
2. A request for a resource protected by the `[Authorization]` kicks off the OIDC middleware login flow
160-
3. The user's browser is redirected to the Criipto Verify service where actual login happens
161-
4. A callback with an issued _authorization code_ is sent back to the application and intercepted by the OIDC middleware
162-
5. The middleware calls the Criipto Verify service to exchange the code for an _access token_. Note that this is a direct server to server call which - unlike the other communication - does not pass through the browser
163-
6. The access token is used by the OIDC middleware to retrieve the available user information which is set as claims on the user principal.
158+
1. The web server starts the application, which configures and initializes the OpenID Connect middleware. The middleware is configured with a URL from which it retrieves the metadata describing the various endpoints (e.g., `token` and `userinfo`) and encryption keys, as well as the token signing certificates.
159+
2. A request for a resource protected by the `[Authorization]` kicks off the OIDC middleware login flow.
160+
3. The user's browser is redirected to the Criipto Verify service, where the actual login takes place.
161+
4. A callback with an issued _authorization code_ is sent back to the application and intercepted by the OIDC middleware.
162+
5. The middleware calls the Criipto Verify service to exchange the code for an _access token_. Note that this is a direct server-to-server call which, unlike the other communication, does not pass through the browser.
163+
6. The access token is used by the OIDC middleware to retrieve the available user information, which is set as claims on the user principal.
164164

165-
If you want to inspect what is actually going on you may see much of it if you use for example chrome and turn on the developer tools to inspect the network traffic.
165+
If you want to inspect the runtime flow, the browser's developer tools (e.g., in Chrome) can be used to examine the network traffic.
166166

167167
## Setting up for Production
168168

169169
import ProductionSnippet from '../../../snippets/set-up-production.mdx';
170170

171-
<ProductionSnippet />
171+
<ProductionSnippet />

0 commit comments

Comments
 (0)