From 9c5c0dc61b2bb415b66707e72f18f4d2c192d8ae Mon Sep 17 00:00:00 2001 From: Developer 02 Date: Wed, 15 Jan 2025 10:56:33 +0100 Subject: [PATCH] =?UTF-8?q?chore:=20Eintragungspunkttr=C3=A4ger=20in=20Swa?= =?UTF-8?q?gger=20hinzugef=C3=BCgt?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- src/DigitalData.Auth.API/Program.cs | 32 ++++++++++++++++++++++++++++- 1 file changed, 31 insertions(+), 1 deletion(-) diff --git a/src/DigitalData.Auth.API/Program.cs b/src/DigitalData.Auth.API/Program.cs index 45c873c..71ba7e5 100644 --- a/src/DigitalData.Auth.API/Program.cs +++ b/src/DigitalData.Auth.API/Program.cs @@ -6,6 +6,7 @@ using DigitalData.UserManager.Domain.Entities; using Microsoft.AspNetCore.Authentication.JwtBearer; using Microsoft.IdentityModel.JsonWebTokens; using Microsoft.IdentityModel.Tokens; +using Microsoft.OpenApi.Models; using System.Security.Claims; var builder = WebApplication.CreateBuilder(args); @@ -38,7 +39,36 @@ builder.Services.AddJwtSignatureHandler(user => new Dictionary +{ + options.AddSecurityDefinition("Bearer", new OpenApiSecurityScheme + { + Name = "Authorization", + Type = SecuritySchemeType.Http, + Scheme = "bearer", + BearerFormat = "JWT", + In = ParameterLocation.Header, + Description = "Enter 'Bearer' [space] and then your valid token." + }); + + options.AddSecurityRequirement(new OpenApiSecurityRequirement + { + { + new OpenApiSecurityScheme + { + Reference = new OpenApiReference + { + Type = ReferenceType.SecurityScheme, + Id = "Bearer" + }, + Scheme = "oauth2", + Name = "Bearer", + In = ParameterLocation.Header + }, + new List() + } + }); +}); // Add authentication Lazy? issuerSigningKeyInitiator = null;