Build services that are resilient to Microsoft Entra ID OpenID Connect metadata refresh
Protected web APIs need to validate access tokens. Web apps also validate the ID tokens. Token Validation has multiple parts, checking whether the token belongs to the application, has been issued by a trusted Identity Provider (IDP), has a lifetime that's still in range and hasn't been tampered with. There can also be special validations. For instance, the app needs to validate the signature and that signing keys (when embedded in a token) are trusted and that the token isn't being replayed. When the signing keys aren't embedded in the token, they need to be fetched from the identity provider (Discovery or Metadata). Sometimes it's also necessary to obtain keys dynamically at runtime.
Web apps and web APIs need to refresh stale OpenID Connect metadata for them to be resilient. This article helps guide on how to achieve resilient apps. It applies to ASP.NET Core, ASP.NET, and Microsoft.IdentityModel.
ASP.NET Core
Use latest version of Microsoft.IdentityModel.* and manually follow the guidelines below.
In the ConfigureServices
method of the Startup.cs, ensure that JwtBearerOptions.RefreshOnIssuerKeyNotFound
is set to true, and that you're using the latest Microsoft.IdentityModel.* library. This property should be enabled by default.
services.Configure<JwtBearerOptions>(AzureADDefaults.JwtBearerAuthenticationScheme, options =>
{
…
// shouldn’t be necessary as it’s true by default
options.RefreshOnIssuerKeyNotFound = true;
…
});
ASP.NET/ OWIN
Microsoft recommends that you move to ASP.NET Core, as development has stopped on ASP.NET.
If you're using ASP.NET (Classic), use the latest Microsoft.IdentityModel.*.
OWIN has an automatic 24-hour refresh interval for the OpenIdConnectConfiguration
. This refresh will only be triggered if a request is received after the 24-hour time span has passed. As far as we know, there's no way to change this value or trigger a refresh early, aside from restarting the application.
Microsoft.IdentityModel
If you validate your token yourself, for instance in an Azure Function, use the latest version of Microsoft.IdentityModel.* and follow the metadata guidance illustrated by the code snippets below.
var configManager =
new ConfigurationManager<OpenIdConnectConfiguration>(
"http://someaddress.com",
new OpenIdConnectConfigurationRetriever());
var config = await configManager.GetConfigurationAsync().ConfigureAwait(false);
var validationParameters = new TokenValidationParameters()
{
…
IssuerSigningKeys = config.SigningKeys;
…
}
var tokenHandler = new JsonWebTokenHandler();
result = Handler.ValidateToken(jwtToken, validationParameters);
if (result.Exception != null && result.Exception is SecurityTokenSignatureKeyNotFoundException)
{
configManager.RequestRefresh();
config = await configManager.GetConfigurationAsync().ConfigureAwait(false);
validationParameters = new TokenValidationParameters()
{
…
IssuerSigningKeys = config.SigningKeys,
…
};
// attempt to validate token again after refresh
result = Handler.ValidateToken(jwtToken, validationParameters);
}
Next steps
To learn more, see token validation in a protected web API