Description
Is there an existing issue for this?
- I have searched the existing issues
Is your feature request related to a problem? Please describe the problem.
I would like to implement a secure client Microsoft.Identity.Web (no ASP.NET Core Identity) using the new Blazor features.
In RC2, this does not work due to Blazor 8 State Management, required duplicate components and persisting the user state which is stored in a cookie on the client.
Would it be possible to support this for the different rendering modes
Describe the solution you'd like
The application authenticates against Microsoft Entra ID using the Web flow and requires a secret or a certificate. (Single Azure App registration)
OIDC Code flow with PKCE is used, not implicit flow which is the default using Microsoft.Identity.Web
The authentication session is stored in a HTTP only secure cookie.
All Blazor components in the different rendering modes have access to the authentication claims and the user session.
The Anti-forgery cookie is used to access APIs or any post, delete, put requests to the same site server. This can be added to the request using a html component in the form or a HTTP request header using a HttpClient.
No unsecure inline scripts are used in the client.
ASP.NET Core Identity is not used.
UI components can be displayed checking the authorized state
Logout form request uses the Anti-forgery cookie
Additional context
No response