Zitadel 4.0.8

There is a newer version of this package available.
See the version list below for details.
dotnet add package Zitadel --version 4.0.8                
NuGet\Install-Package Zitadel -Version 4.0.8                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Zitadel" Version="4.0.8" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Zitadel --version 4.0.8                
#r "nuget: Zitadel, 4.0.8"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Zitadel as a Cake Addin
#addin nuget:?package=Zitadel&version=4.0.8

// Install Zitadel as a Cake Tool
#tool nuget:?package=Zitadel&version=4.0.8                

ZITADEL

The ZITADEL.net library is a collection of tools for building web applications. It supports easy access to the ZITADEL API as well as authentication handlers for .NET web applications and web APIs.

Credentials

There are three credentials that help with the access to ZITADEL:

  • "Application": used in web APIs to authenticate the relying party
  • "BasicAuthentication": creating normal basic auth credentials
  • "ServiceAccount": loads a service account json and authenticates against ZITADEL

The application supports creating a signed JWT token on behalf of the application:

var application = Application.LoadFromJsonString(
@"{
  ""type"": ""application"",
  ""keyId"": ""keyid"",
  ""key"": ""RSA KEY"",
  ""appId"": ""appid"",
  ""clientId"": ""client id""
}");
var jwt = await application.GetSignedJwtAsync("issuer");

The service account allows you to load a service account json and authenticate against ZITADEL to fetch a valid access token:

var serviceAccount = ServiceAccount.LoadFromJsonString(
    @"
{
  ""type"": ""serviceaccount"",
  ""keyId"": ""key id"",
  ""key"": ""RSA KEY"",
  ""userId"": ""user id""
}");
var token = await serviceAccount.AuthenticateAsync();

Accessing the ZITADEL API

ZITADEL.gRPC provides the compiled proto files. The ZITADEL library provides helper functions to create the four types of "clients":

  • AuthClient
  • AdminClient
  • ManagementClient
  • SystemClient

The ZITADEL docs describe the gRPC calls and how to use them.

As an example, one may use the AuthClient to fetch the user information.

With a personal access token of a service account

const string apiUrl = "https://zitadel-libraries-l8boqa.zitadel.cloud";
const string personalAccessToken = "TOKEN";
var client = Clients.AuthService(new(apiUrl, ITokenProvider.Static(personalAccessToken)));
var result = await client.GetMyUserAsync(new());
Console.WriteLine($"User: {result.User}");

With a service account JWT profile

const string apiProject = "PROJECT ID";
var serviceAccount = ServiceAccount.LoadFromJsonString(
@"{
  ""type"": ""serviceaccount"",
  ""keyId"": ""key id"",
  ""key"": ""RSA KEY"",
  ""userId"": ""user id""
}");
client = Clients.AuthService(
    new(
        apiUrl,
        ITokenProvider.ServiceAccount(
            serviceAccount,
            apiUrl,
            apiProject)));
result = await client.GetMyUserAsync(new());
Console.WriteLine($"User: {result.User}");

Authentication in Web Apps

To authenticate ASP.NET web applications, use the AddZitadel() extension method on the IAuthenticationBuilder. You will need an application on a ZITADEL instance and a client ID.

// -- snip --
builder.Services
    .AddAuthorization()
    .AddAuthentication(ZitadelDefaults.AuthenticationScheme)
    .AddZitadel(
        o =>
        {
            o.Authority = "https://zitadel-libraries-l8boqa.zitadel.cloud/";
            o.ClientId = "170088295403946241@library";
            o.SignInScheme = IdentityConstants.ExternalScheme;
        })
    .AddExternalCookie()
    .Configure(
        o =>
        {
            o.Cookie.HttpOnly = true;
            o.Cookie.IsEssential = true;
            o.Cookie.SameSite = SameSiteMode.None;
            o.Cookie.SecurePolicy = CookieSecurePolicy.Always;
        });
// -- snip --

The example above allows an ASP.NET web application to authenticate against ZITADEL and use the external cookie scheme to store the access token in a secure cookie.

Authentication in Web APIs

Authenticating web APIs is similar to authenticating web apps. In contrast to a web application, the web API cannot hold a user session with an external application cookie. Instead, web APIs use the introspection endpoint of ZITADEL to fetch information about the presented access token (be it JWT or opaque token). The authentication mechanism is based on the OAuth2Introspection package of "IdentityModel".

In ZITADEL you may use two different authentication methods:

  • Basic Auth
  • JWT Profile

With basic auth, you need to use client_id and client_secret, and with JWT profile, a special json is generated for you, that is required to authenticate the web API against ZITADEL.

builder.Services
    .AddAuthorization()
    .AddAuthentication()
    .AddZitadelIntrospection(
        o =>
        {
            o.Authority = "https://zitadel-libraries-l8boqa.zitadel.cloud/";
            o.ClientId = "170102032621961473@library";
            o.ClientSecret = "KNkKW8nx3rlEKOeHNUcPx80tZTP1uZTjJESfdA3kMEK7urhX3ChFukTMQrtjvG70";
        });

The code above uses basic authentication. You need to be sure that your API application in ZITADEL is configured to use basic authentication.

Below, a JWT profile (application credential) is used to authenticate the web API. Note that the client id is no longer required. Using JWT profile is the recommended way to authenticate web APIs.

builder.Services
    .AddAuthorization()
    .AddAuthentication()
    .AddZitadelIntrospection(
        o =>
        {
            o.Authority = "https://zitadel-libraries-l8boqa.zitadel.cloud";
            o.JwtProfile = Application.LoadFromJsonString("YOUR APPLICATION JSON");
        });

Caching

The OAuth2Introspection supports caching of the access token for a configured amount of time. This reduces the load on the issuer and allows faster requests for the same token. To enable caching, you need to configure caching in the options of AddZitadelIntrospection and add an implementation of IDistributedCache.

Faking / Mocking local Authentication

To enable local development or testing without a real world ZITADEL instance, you may use the mocked authentication. It simply adds all provided claims to the constructed identity and lets all calls pass as "authenticated".

You may send a request with two special headers to overwrite the behaviour per request:

  • x-zitadel-fake-auth: If this header is set to "false", the request will return as "unauthenticated"
  • x-zitadel-fake-user-id: If this header is set, the value of the header will be user as user ID.

To enable the fake authentication, simply use the AddZitadelFake extension method:

builder.Services
    .AddAuthorization()
    .AddAuthentication()
    .AddZitadelFake(o =>
        {
            o.FakeZitadelId = "1337";
        });
Product Compatible and additional computed target framework versions.
.NET net6.0 is compatible.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (1)

Showing the top 1 NuGet packages that depend on Zitadel:

Package Downloads
Zitadel.Api

The API library for Zitadel. Implemented with gRPC, it allows access to the API of any Zitadel instance (default: https://api.zitadel.ch).

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
7.0.3 128 11/21/2024
7.0.2 694 11/13/2024
7.0.1 405 11/8/2024
7.0.0 1,116 10/28/2024
6.2.0 422 10/28/2024
6.1.4 100 10/28/2024
6.1.3 94 10/28/2024
6.1.2 44,421 1/31/2024
6.1.1 285 1/26/2024
6.1.0 693 1/26/2024
6.0.0 501 1/24/2024
5.3.3 6,188 1/10/2024
5.3.2 684 1/9/2024
5.3.1 1,965 1/3/2024
5.3.0 2,907 12/19/2023
5.2.26 12,865 10/4/2023
5.2.25 5,262 9/13/2023
5.2.24 721 9/8/2023
5.2.23 453 9/7/2023
5.2.22 394 9/7/2023
5.2.21 1,354 8/25/2023
5.2.20 1,765 8/19/2023
5.2.19 1,244 8/11/2023
5.2.18 995 8/9/2023
5.2.17 422 8/8/2023
5.2.16 2,084 7/17/2023
5.2.15 461 7/17/2023
5.2.14 613 7/11/2023
5.2.13 1,278 7/7/2023
5.2.12 527 7/5/2023
5.2.11 974 6/24/2023
5.2.10 450 6/23/2023
5.2.9 620 6/18/2023
5.2.8 7,093 5/27/2023
5.2.7 700 5/17/2023
5.2.6 589 5/9/2023
5.2.5 542 5/6/2023
5.2.4 526 5/5/2023
5.2.3 3,464 4/27/2023
5.2.2 616 4/22/2023
5.2.1 553 4/17/2023
5.2.0 688 4/14/2023
5.2.0-prerelease.3 85 4/14/2023
5.2.0-prerelease.2 84 4/14/2023
5.2.0-prerelease.1 89 4/13/2023
5.1.1 487 4/14/2023
5.1.0 504 4/13/2023
5.0.32 507 4/13/2023
5.0.31 469 4/12/2023
5.0.30 861 3/31/2023
5.0.29 568 3/26/2023
5.0.28 1,409 3/16/2023
5.0.27 584 3/15/2023
5.0.26 696 3/8/2023
5.0.25 947 3/3/2023
5.0.24 640 2/17/2023
5.0.23 555 2/16/2023
5.0.22 561 2/15/2023
5.0.21 584 2/15/2023
5.0.20 601 2/14/2023
5.0.19 620 2/10/2023
5.0.18 560 2/9/2023
5.0.17 583 2/8/2023
5.0.16 1,778 1/12/2023
5.0.15 601 1/11/2023
5.0.14 778 1/3/2023
5.0.13 691 12/16/2022
5.0.12 674 12/14/2022
5.0.11 640 12/8/2022
5.0.10 601 12/8/2022
5.0.9 693 12/3/2022
5.0.8 650 12/1/2022
5.0.7 821 11/18/2022
5.0.6 719 11/8/2022
5.0.5 770 10/27/2022
5.0.4 736 10/19/2022
5.0.3 740 10/17/2022
5.0.2 1,275 10/12/2022
5.0.1 724 10/6/2022
5.0.0 708 10/6/2022
4.0.12 751 9/30/2022
4.0.11 737 9/28/2022
4.0.10 765 9/27/2022
4.0.9 830 9/14/2022
4.0.8 835 9/2/2022
4.0.7 865 8/25/2022
4.0.6 762 8/19/2022
4.0.5 754 8/17/2022
4.0.4 754 8/10/2022
4.0.3 978 7/26/2022
4.0.2 858 7/22/2022
4.0.1 826 7/18/2022
4.0.0 800 7/18/2022
3.4.7 2,353 4/22/2022
3.4.6 1,028 4/20/2022
3.4.5 1,052 4/12/2022
3.4.4 1,046 4/1/2022
3.4.3 1,035 3/22/2022
3.4.2 1,078 3/8/2022
3.4.1 1,274 2/23/2022
3.4.0 982 2/23/2022
3.3.12 1,409 11/19/2021
3.3.11 1,039 11/8/2021
3.3.10 987 10/29/2021
3.3.9 951 10/26/2021
3.3.8 994 10/20/2021
3.3.7 998 10/19/2021
3.3.6 981 10/12/2021
3.3.5 1,006 10/11/2021
3.3.4 953 10/5/2021
3.3.3 1,014 9/30/2021
3.3.2 1,002 9/15/2021
3.3.1 936 9/14/2021
3.3.0 1,076 9/8/2021
3.2.3 949 9/7/2021
3.2.2 986 8/18/2021
3.2.1 959 8/13/2021
3.2.0 962 8/4/2021
3.1.8 1,092 6/22/2021
3.1.7 947 6/11/2021
3.1.6 2,874 6/8/2021
3.1.5 1,007 5/26/2021
3.1.4 875 5/25/2021
3.1.3 882 5/24/2021
3.1.2 909 5/13/2021
3.1.1 892 5/11/2021
3.1.0 947 5/7/2021
3.0.3 924 5/7/2021
3.0.2 971 5/1/2021
3.0.1 899 4/21/2021
3.0.0 903 4/16/2021
2.2.6 988 4/13/2021
2.2.5 922 4/9/2021
2.2.4 969 4/8/2021
2.2.3 984 4/6/2021
2.2.2 861 4/2/2021
2.2.1 918 4/1/2021
2.2.0 875 3/30/2021
2.1.2 1,004 3/25/2021
2.1.1 875 3/25/2021
2.1.0 676 3/25/2021
2.0.0 769 3/8/2021
1.2.0 1,032 1/14/2021
1.1.0 776 1/11/2021
1.0.0 888 12/18/2020