- Issue and verify credentials using the Swiss Digital identity public beta, ASP.NET Core and .NET Aspire
- Use swiyu, the Swiss E-ID to authenticate users with Duende and .NET Aspire
- Implement MFA using swiyu, the Swiss E-ID with Duende IdentityServer, ASP.NET Core Identity and .NET Aspire
- Implement forgot your password using swiyu, ASP.NET Core Identity and Aspire
- Digital authentication and identity validation
- Set the amr claim when using passkeys authentication in ASP.NET Core
- Implementing Level of Authentication (LoA) with ASP.NET Core Identity and Duende
- Implementing Level of Identification (LoI) with ASP.NET Core Identity and Duende
- Force step up authentication in web applications
- Use client assertions in ASP.NET Core using OpenID Connect, OAuth DPoP and OAuth PAR
- Secure the swiyu container using a YARP proxy
- Add Application security to the swiyu generic management verifier APIs using OAuth
A Duende identity server is used as an OpenID Connect server for web applications. When the user authenticates, the Swiss E-ID can be used as a second factor to authenticate. The applications are implemented using Aspire, ASP.NET Core and the Swiss public beta generic containers. The containers implement the OpenID verifiable credential standards and provide a simple API to integrate applications. Using swiyu is simple, but not a good way of doing authentication as it is not phishing resistant.
- ImageMagick: https://github.com/manuelbl/QrCodeGenerator/tree/master/Demo-ImageMagick
- Microsoft Aspire: https://learn.microsoft.com/en-us/dotnet/aspire/get-started/aspire-overview
- Net.Codecrete.QrCodeGenerator: https://github.com/manuelbl/QrCodeGenerator/
- swiyu https://github.com/swiyu-admin-ch/swiyu-verifier
Used data: given_name, family_name, birth_date and birth_place.
- User has already an account and would like to attach an E-ID for authentication
- User registers MFA swiyu
- User validates authentication using E-ID
- User authenticates using password and swiyu
Note: authentication uses E-ID is NOT phishing resistant. Passkeys would be better.
- User enters username (email)
- User enters email
- User verifies using swiyu, validates against DB
- Sign-in and create cookie
Note: authentication uses E-ID is NOT phishing resistant. Passkeys would be better.
See Pages/Account/Manage/Swiyu.cshtml
Details in blog.
See ForgotPasswordSwiyu Razor page.
Details in blog.
https://swiyu-admin-ch.github.io/cookbooks/how-to-use-beta-id/
https://swiyu-admin-ch.github.io/cookbooks/onboarding-generic-verifier/
https://damienbod.com/2022/10/17/is-scanning-qr-codes-for-authentication-safe/
