ASP Net Core Cookie Authentication With SPA

ASP.NET Core is a fantastic framework for web applications, representing a significant leap in architecture design compared to ASP.NET MVC. However, as I began working with it, I noticed it has strong opinions about how certain things should be done. These preferences are evident not just in the framework itself but also in various tutorials and blog posts created around it.

If you prefer doing things in your own way, finding assistance can be challenging. One common preference is using the Authorization header token authentication, like JWT, for Single Page Applications (SPA). Personally, I struggled to find tutorials or documentation explaining how to use cookie authentication for SPAs in ASP.NET Core.

I won't get into the ongoing debate about whether this idea is good or not, as there are plenty of blog posts and videos discussing it already. In this article, I will show you how I managed to set up cookie authentication in a Single Page Application (SPA) using the ASP.NET Core SPA template. Along the way, I'll share the challenges I faced and the things you need to be cautious about. It's also a chance to dig a bit deeper and understand some internal aspects of the framework.

The Design:

When I began software development, authentication and authorization were always significant points of discussion. The key takeaway is that there isn't a universal solution that fits all scenarios. The strategy chosen depends heavily on the specific requirements of the application in question.

The design I'm explaining in this article is specific to this particular application. It's important to note that it might not be the best or a perfect solution for every situation.

There are two main approaches here. One is to start from scratch, creating your own middlewares and filters and writing all the code yourself. The other approach is to make the most of what the framework provides, customizing only the necessary parts. I'm opting for the latter method.

The idea is straightforward: once the user logs in, I generate a JWT token and send it as an "Http Only" cookie. This method ensures that XSS scripts can't capture the token.

  private readonly LoinUserService _loginUserService;
private readonly IAntiforgery _antiforgery;

public UserApiController(LoinUserService loginUserService,
                         IAntiforgery antiforgery)
{
    _loginUserService = loginUserService;
    _antiforgery = antiforgery;
}

private void RefreshedCSRFToken()
{
    var tokens = _antiforgery.GetAndStoreTokens(HttpContext);
    HttpContext.Response.Cookies.Append("XSRF-TOKEN",
                                        tokens.RequestToken,
                                        new CookieOptions() { HttpOnly = false });
}

[HttpPost]
[Route("login")]
[ValidateAntiForgeryToken]
[ValidateModel]
[TrimInputStrings]
public async Task<IActionResult> Login([FromBody]LoginModel loginModel)
{
    var userDto = await _loginUserService.LoginAsync(loginModel);

    if (userDto == null)
    {
        return Unauthorized("Invalid user name or password.");
    }

    var claimsIdentity = _loginUserService.GenerateClaimsIdentity(userDto);

    var jwtToken = _loginUserService.GenerateJwtToken(claimsIdentity);

    HttpContext.User = new ClaimsPrincipal(claimsIdentity);
    RefreshedCSRFToken();

    HttpContext.Response.Cookies.Append("jwt",
                                        jwtToken,
                                        new CookieOptions() { HttpOnly = true });

    return Ok();
}
  

I won't explain how to create the claims and generate the JWT cookie here because there are many online tutorials covering that. The key point is that the JWT is sent back as an "Http Only" cookie and isn't directly controlled by the client application.

We opt for cookie authentication instead of the usual JWT authentication for our authentication scheme.

  public void ConfigureServices(IServiceCollection services)
{
    services.Configure<CookiePolicyOptions>(options =>
    {
        
        options.CheckConsentNeeded = context => true;
        options.MinimumSameSitePolicy = SameSiteMode.None;
    });
    
    
    services.AddAntiforgery(options => {
        options.HeaderName = "X-XSRF-TOKEN";
        options.Cookie = new CookieBuilder()
        {
            Name = "XSRF"
        };
    });

    services.AddAuthentication(CookieAuthenticationDefaults.AuthenticationScheme)
            .AddCookie();
   
}
  

Here's where ASP.NET Core steps in with its perspective. I couldn't find a pre-built solution to decode the JWT stored in a cookie; the available ones decoded it only from the header. So, I developed a custom middleware. Its sole job is to verify if the JWT is still valid. If it is, the middleware populates the HttpContext User (ClaimsPrincipal) with the data from the JWT.

  public static class JwtCookieAuthMiddleware
{
      public static void UseJwtCookieAuthMiddleware(this IApplicationBuilder app,
                                              IAntiforgery antiforgery,
                                              byte[] key,
                                              bool autoRefresh = true,
                                              string cookieName = "jwt",
                                              string csrfCookieName = "XSRF-TOKEN")
    {
        app.Use(async (context, next) =>
        {
            string jwtStr = context.Request.Cookies[cookieName];
            if (string.IsNullOrEmpty(jwtStr))
            {
                await next();
                return;
            }
            var validationParameters = new TokenValidationParameters
            {
                // Clock skew compensates for server time drift.
                ClockSkew = TimeSpan.FromMinutes(5),
                ValidateIssuerSigningKey = true,
                IssuerSigningKey = new SymmetricSecurityKey(key),
                RequireSignedTokens = true,
                RequireExpirationTime = true,
                ValidateLifetime = true,
                // Ensure the token audience matches our audience value (default true):
                ValidateAudience = false,                    
                ValidateIssuer = false
            };
            ClaimsIdentity claimsIdentity = null;
            ClaimsPrincipal newPrincipal;
            JwtSecurityToken jwtToken = null;
            try
            {
                var claimsPrincipal = new JwtSecurityTokenHandler()
                                          .ValidateToken(jwtStr,
                                                         validationParameters,
                                                         out var rawValidatedToken);
                //rawValidatedToken.
                claimsIdentity = new ClaimsIdentity("AuthenticationTypes.Federation");
                foreach (var claim in claimsPrincipal.Claims)
                {
                    if (claim.Type == "iat" ||
                        claim.Type == "exp" ||
                        claim.Type == "nbf")
                    {
                        continue;
                    }
                    claimsIdentity.AddClaim(claim);
                }
                newPrincipal = new ClaimsPrincipal(claimsIdentity);
                context.User = newPrincipal;
                jwtToken = rawValidatedToken as JwtSecurityToken;
                context.Items[Constants.JwtTokenKey] = jwtToken;
            }
            catch (Exception)
            {
                var tokens = antiforgery.GetAndStoreTokens(context);
                context.Response.Cookies.Append(csrfCookieName,
                                                tokens.RequestToken,
                                                new CookieOptions() { HttpOnly = false });
                context.Response.Cookies.Delete(cookieName);
            }
            if (autoRefresh &&
                jwtToken != null &&
                claimsIdentity != null)
            {
                CheckAndRefreshToken(key, claimsIdentity, jwtToken, cookieName, context);
            }
            await next();
        });
    }
}
  

CSRF Protection:

As expected with this cookie-based authentication, it comes with a Cross Site Request Forgery (CSRF) threat. Here's where another challenge arises in the ASP.NET Core framework. CSRF protection involves two components: a "Http Only" cookie containing the CSRF token that remains active for the session and a request token that must accompany the request, either in the form body or as a header. In traditional MVC applications, placing the token as a hidden field in the form is straightforward. However, in Single Page Applications (SPAs), POST requests are usually sent in JSON format. This means the CSRF request token must be included in the request header, adding a layer of complexity.

Here's the tricky part: the CSRF request token is computed based on both the CSRF cookie and the claims in the HttpContext User ClaimsPrincipal. If any claim differs for the CSRF request token, it won't function properly. That's why we remove certain claims like "iat," "exp," and "nbf" when setting up the ClaimsPrincipal. By doing this, if we refresh the token (which isn't discussed in this article), we don't need to regenerate the CSRF request token. This prevents it from failing in the current request.

In a Single Page Application (SPA), every time a user logs in, a new request token needs to be sent to the client through a cookie that isn't "Http Only". This allows the client to access it and place it in the header. When the user logs out, the CSRF request meant for the anonymous user also needs to be sent back to the client. You can observe this process in the logout section provided below.

In the middleware code, when the JWT token expires, we send a CSRF request token for the anonymous user, similar to the logout action. This allows the client to continue working with the login endpoint and other functionalities.

  [HttpGet]
[Route("logout")]
public IActionResult Logout()
{
    HttpContext.User = new ClaimsPrincipal();
    RefreshedCSRFToken();

    HttpContext.Response.Cookies.Delete("jwt");

    return Ok();
}
CSRF for unsecure actions:

Everything is running smoothly, but there's one scenario where this approach might lead to an unexpected error. If a user is authenticated and makes a POST request for an action that doesn't need authentication, and the token has expired, the request will fail. This happens because the token sent is for a specific user (with certain claims), but now the anonymous user is in the ClaimsPrincipal. It's important to note that since the middleware updates the cookie when the JWT token expires, the next request will work as expected.

Is this the only solution to this problem? Not at all, there are alternatives. One option is to not enforce CSRF protection for this particular endpoint. In your application's design, any action considered insecure should not involve user authentication or make changes requiring it. By ensuring this, there's no benefit for anyone trying to deceive your user with a malicious CSRF page, because they can't perform any actions that require authentication.

A major question arises: should CSRF be used for actions that don't require authentication? Take the login page, for example. It doesn't necessarily need CSRF protection since the user isn't authenticated at that point.

In my method, I do include CSRF protection even for insecure actions, just to ensure extra security, especially on the login page. To have the CSRF token available when the user loads your SPA, you also need a middleware to send this request token. This process is demonstrated in the example below.

  public static class AntiforgeryCookieTokenMiddleware
{
   
    public static void UseAntiforgeryCookieTokenMiddleware(this IApplicationBuilder app,
                                                      IAntiforgery antiforgery,
                                                      string cookieName = "XSRF-TOKEN")
    {
        app.Use(async (context, next) =>
        {
            var tokens = antiforgery.GetAndStoreTokens(context);
            context.Response.Cookies.Append(cookieName,
                                            tokens.RequestToken,
                                            new CookieOptions() { HttpOnly = false });
            await next();
        });
    }
}
  

  public void Configure(IApplicationBuilder app, IHostingEnvironment env)
{
    
    
    app.UseHttpsRedirection();
    app.UseStaticFiles();
    app.UseSpaStaticFiles();
    app.UseCookiePolicy();

    app.UseJwtCookieAuthMiddleware(app.ApplicationServices.GetService<IAntiforgery>(), Encoding.ASCII.GetBytes("signing key"));

    app.UseMvc(routes =>
    {
        routes.MapRoute(
            name: "default",
            template: "{controller=Home}/{action=Index}/{id?}");
    });

    app.UseAntiforgeryCookieTokenMiddleware(app.ApplicationServices.GetService<IAntiforgery>());

    app.UseSpa(spa =>
    {
        spa.Options.SourcePath = "ClientApp";
        if (env.IsDevelopment())
        {
            //spa.UseReactDevelopmentServer(npmScript: "start");
            spa.UseProxyToSpaDevelopmentServer("http://localhost:3000");
        }
    });
}

  

This middleware should be placed right before the app.UseSpa() middleware. Here's why: when the request goes through the previous middlewares and doesn't match any file or action, the UseSpa middleware sends your Index.html containing the SPA code to the user. As for the JWT Cookie middleware, use it in the same way you would use the default authentication middleware in ASP.NET Core.

Comments