Dangl.Identity.Client.Models 6.1.0

Prefix Reserved
There is a newer version of this package available.
See the version list below for details.
dotnet add package Dangl.Identity.Client.Models --version 6.1.0                
NuGet\Install-Package Dangl.Identity.Client.Models -Version 6.1.0                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Dangl.Identity.Client.Models" Version="6.1.0" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Dangl.Identity.Client.Models --version 6.1.0                
#r "nuget: Dangl.Identity.Client.Models, 6.1.0"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Dangl.Identity.Client.Models as a Cake Addin
#addin nuget:?package=Dangl.Identity.Client.Models&version=6.1.0

// Install Dangl.Identity.Client.Models as a Cake Tool
#tool nuget:?package=Dangl.Identity.Client.Models&version=6.1.0                

Dangl.Identity.Client www.dangl-it.com

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (1)

Showing the top 1 NuGet packages that depend on Dangl.Identity.Client.Models:

Package Downloads
Dangl.Identity.Client.Mvc

Dangl.Identity.Client www.dangl-it.com

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
6.2.0 124 10/31/2024
6.1.0 1,579 10/17/2023
6.0.2 327 9/21/2023
6.0.1 753 7/20/2023
6.0.0 178 7/20/2023
5.0.1 1,024 2/15/2023

## v6.1.0:
- Added a new endpoint to the `DanglIdentityController` that returns the user info data for the current request. If the user and / or client is authenticated, it will return all current claims. This is useful if backend-for-frontend authentication via cookies is used, where the frontend does not have direct access to the JWT
- The `claims` property in the Angular `UserInfo` object's type was changed from `{[key: string]: string}` to `{[key: string]: string[]}`
- Added `DanglIdentityServerConfiguration.RelativeRedirectForAccessDenied`, to configure access denied redirect paths in cases where the user declines consent when using OpenID Connect cookie authentication
- Added `DanglIdentityServerConfiguration.SetIncludeJwtBearerWithOpenIdCookie`, to configure both OpenID Connect cookie and JWT authentication in the same application

## v6.0.2:
- Updated internal dependencies

## v6.0.1:
- Fixed a bug in the release pipeline that failed if the MS Teams API (for notifications) was returning an error

## v6.0.0:
- The `DanglIdentityAppTokenHandler` class is now available in the **Dangl.Identity.Client.App** package
- The `DanglIdentityServerTokenHandler ` class is now available in the **Dangl.Identity.Client** package
- Fixed a bug where the provided `IAccoundDelegatedClient` in the **Dangl.Identity.Client.Mvc** package did not correctly use authentication when interacting with **Dangl.Identity**
- The **Dangl.Identity** packages were updated to version 6

## v5.0.1:
- The **Dangl.Identity.Client** libraries are now all published to public NuGet and MyGet feeds

## v5.0.0
- Update to .NET 7 & latest **Dangl.Identity** dependencies

## v4.1.3:
- The lifecycle management in the Angular client was updated to correctly complete and unsubscribe from all subscriptions
- Fixed a bug in the `DanglIdentityUserInfoUpdater` that caused exceptions when new users were created from JWT tokens concurrently

## v4.1.2:
- The Angular client was updated to use any Angular version at v14 or upwards

## v4.1.1:
- The Angular client was updated to Angular v14

## v4.1.0:
- The client libraries and tests were updated to .NET 6 and **Dangl.Identity** dependencies were updated to v4.2

## v4.0.1:
- Updated the frontend dependency to Angular v13

## v4.0.0:
- All packages were updated to **Dangl.Identity** v4 and to .NET 5
- Support for fallback uris for **Dangl.Identity** has been removed. This was rarely used in practice, and makes integrations in clients easier

## v3.4.0:
- The Angular package was upgraded to Angular v12
- The `DanglIdentityServerConfiguration.HttpMessageHandlerFactory` will now no longer default to an `Action` that returns `null` but will itself be set to `null` for new instances
- The .NET client now uses `System.Text.Json` internally instead of `Newtonsoft.Json` for Json serialization
- Added `IDanglIdentityRequestValidator` to Angular client to allow developers to control for which requests authorization tokens are included

## v3.3.0:
- `DanglIdentityAuthenticationExtensions.UseDanglIdentityJwtTokenAuthentication` now optionally supports to accept access tokens via query parameters, e.g. for usage in SignalR
- `DanglIdentityServerConfiguration.JwtBearerOptionsConfig` was added as a way to customize the `AddJwtBearer` configuration

## v3.2.5
- Bugfix in the Angular library where a subscription to the token refresh event did not end after the first event

## v3.2.4:
- The `DanglIdentityAuthenticationExtensions` will now log the id of the client used for JWT logins
- The `DanglIdentityServerConfiguration` class now has the `AllowInsecureJwtIssuers` property that allows to disable the Https requirement for token issuers

## v3.2.3:
- Fixed a bug in the Angular library where refresh token requests were cancelled when a dependency requested a refresh token but then cancelled the request. This led to the refresh token becoming invalid, thus requiring a reauthentication from the user

## v3.2.2:
- The Angular library was updated to Angular v10

## v3.2.1:
- The `UseDanglIdentityJwtTokenAuthentication` extension will now also work when the configured base urls have a trailing slash `/`

## v3.2.0:
- Added the `ClaimsUtilities` class for helping with managing claims from Jwt tokens
- When performing a non-OpenID Cookie login, all user claims except some ignored ones will now be put on the user principal
- Fixed an error where the `IUserInfoService.GetCurrentUserIdAsync()` method could throw an exception when the user id was only present in the `sub` claim and not in the ASP.NET Core default `nameidentifier`

## v3.1.0:
- The OpenID Extensions now remove the default claim type mapping and directly use the claim types from the JWT token, e.g. `role` is now directly available as a claim

## v3.0.0:
- Update to **Dangl.Identity** v3.0.0 and to .NET Core 3.1
- The OpenID Connect extensions now check the `access_token` expiry and refresh the token if necessary. Additionally, locked out or deleted users are now also removed from client applications
- When using the OpenID Connect extensions, it internally now calls `AddIdentityCore` instead of `AddIdentity` and adds some required services. This might break client applications that rely on services now no longer included. Consumers should manually add these to the dependency injection configuration
- The `AddMvcWithDanglIdentity` extension was renamed to `AddControllersWithDanglIdentity` and the internal call to `AddMvc` was replaced with `AddControllers`. If required, consumers should manually call `AddMvc` in their apps
- The Angular library was updated to Angular v9.1.9

## v2.6.0:
- Added `UserInfo` and `AccessTokenExtensions` in **Dangl.Identity.Client**

## v2.5.2:
- Added checks for the `UserInfoService` in the **Dangl.Identity.Client.MVC** package to give meaningful error messages in cases of invalid configuration

## v2.5.1:
- Dropped dependency `IdentityServer4.AccessTokenValidation`

## v2.5.0:
- The generated assemblies now have a strong name. This is a breaking change of the binary API and will require recompilation on all systems that consume this package. The strong name of the generated assembly allows compatibility with other, signed tools. Please note that this does not increase security or provide tamper-proof binaries, as the key is available in the source code per [Microsoft guidelines](https://msdn.microsoft.com/en-us/library/wd40t7ad(v=vs.110).aspx)

## v2.4.3:
- Add `RequiredJwtRoles` and `RequiredJwtClaims` to `DanglIdentityServerConfiguration` to configure required claims and / or roles when using Jwt authentication

## v2.4.2:
- When `UseDanglIdentityJwtAuthentication` is enabled on servers, the integrated endpoints for cookie authentication are disabled
- CI tests for the .NET components are now also run on Linux

## v2.4.1:
- Include `Id` for current user in Angular client `AuthenticationMessenger`

## v2.4.0:
- Refactoring of Angular client

## v2.3.0:
- Update of **Dangl.Identity** dependencies
- Breaking Change: If you're using **Dangl.Identity** Jwt authentication from the **Dangl.Identity.Client.Mvc** package, you should set the property `UseDanglIdentityJwtAuthentication` in the configuration for **Dangl.Identity** to `true` and ensure that `app.UseDanglIdentityJwtTokenAuthentication()` is called early in your request pipeline

## v2.2.1:
- Bugfix where the Angular library failed to update the current authentication status after failed token refresh attempts

## v2.2.0:
- An Angular front end package is now available at `@dangl/angular-dangl-identity-client`

## v2.1.0:
- Update internal dependencies to latest **Dangl.Identity** and to ASP.NET Core 2.2

## v2.0.8:
- Update internal dependencies

## v2.0.7:
- Fix bug where invalid Jwt tokens led to internal server error responses in `Dangl.Identity.Client.Mvc`

## v2.0.4:
- Remove `HttpMessageHandler` constructor argument from `UserInformationTransmissionHttpHandler` to be better composable with `HttpClientFactory`
- Add overload to `UserInformationTransmissionHttpHandler` that allows to supply `IHttpContextAccessor` to be able to resolve dependencies on the fly from the `RequestServices`

## v2.0.3:
- Switch to `HttpClientFactory`
- Introduced `DanglIdentityHttpClientAccessor` to abstract accessing `HttpClient` in **Dangl.Identity.Client.Mvc** services

## v2.0.0:
- Add support for user identicon id properties
- Update to latest version 2.0.1 of `Dangl.Identity`
- Renamed `Dangl.Identity.OAuth` to `Dangl.Identity.Client.Mvc`

## v1.2.2:
- Fix deserialization error of Jwt `Bearer` tokens to no longer throw exceptions on invalid input in **Dangl.Identity.Client.Mvc**

## v1.2.1:
- `Dangl.Identity.Client` is now public

## v1.2.0:
- Add support for client-side integration of OpenID with **Dangl.Identity** as OpenID provider
- Add `UserInformationTransmissionHttpHandler` to share user information for requests contexts across different services
- `IUserService` will now also determine user ids and whether users are authenticated in inter-service calls
- See the README for requirements & setup on how to transmit user ids in inter-service requests
- The extensions for OAuth as server-side integration now only support either Cookie auth or Jwt, not both. Specifying one will disable the other

## v1.1.1:
- Add `UserInfoService.CLIENT_CLAIM_PREFIX`
- `IUserInfoService.GetCurrentClientIdAsync()` now returns a `string` as `ClientId` to be in sync with **Dangl.Identity**
- Added `ClientCredentialsLoginAsync` to `DanglIdentityLoginHandler`

## v1.1.0
- Update to stay in sync with **Dangl.Identity**

## v1.0.0
- Initial Release