Microservices is an architectural style that structures an application as a collection of loosely coupled services, which implement business capabilities. The microservice architecture enables the continuous delivery/deployment of large, complex applications. It also enables an organization to evolve its technology stack.

In contexts like this, it is easy to have web solutions composed by dozens of microservices, that exposes independent APIs.

These APIs can provide anonymous access to their services, but in the real world often they must be authenticated. This means that once a user authenticates to an identity provider, an easy way to have a “single sign-on” to dozens of microservices is needed.

To add more complexity, a generic API implemented as microservice could require information from another microservice or another API (API to API authenticated call).

At the times of the Active Directory integrated authentication, the solution was quite easy: the developer turned ON the flag “authenticated user only” on IIS and all, magically, was secured but with the classical limitation of these old times: all machines must trust a common Active Directory (yes, the scenario can become more inclusive with trusted domains and forests but this is not the scope of this post).

Nowadays, we are lucky, OpenID Connect and OAUTH2 have changed (or have opened…) the world of authentication and authorization.

Azure Active Directory B2C, Microsoft’s cloud-based identity and access management solution for consumer-facing web and mobile applications can now come in the game. It is an highly-available global service that scales to hundreds of millions of consumer identities. Built on an enterprise-grade secure platform, Azure Active Directory B2C keeps your business and your consumers protected and support open standards such as OpenID Connect OAUTH2.

If you need to architect a microservices based solution that uses the modern authentication to provide its services to millions of authenticated users stored on Azure B2C, here you can find a step by step configuration walkthrough based on .NET Core, Angular and Xamarin.

Whatever the purpose of your service is, you’ll have:

  • dozen of autheed APIs ( => user authentication)
  • different clients and technologies ( => Mobile, Single Page App)
  • single sign-on cross APIs
  • APIs that internally needs to call other APIs ( => preserving the user context)

this means that you’ll need to manage how to:

  • authenticate users
  • call one or more APIs in the user context from mobile
  • call one or more APIs in the user context from the web app
  • nested API calls

as shown in the following schema

Playground Architecture

In this Github repository you can find the step-by-step instruction I have prepared to implement a playground that implements all the above components:

  • An Azure B2C instance
  • A “Calculator API”
  • A “Scientific Calculator API” that the impersonator calls the Calculator API
  • A Web Application (Single Page Application) that authenticates on Azure B2C and calls both Calculator and Scientific Calculator
  • A Xamarin Form Application that authenticates on Azure B2C and calls both Calculator and Scientific Calculator

While all the detail and the step by step and the code is on GitHub, here I want to only summarize the main steps and few takeaways I have learned in implementing the solution (**).

web calculator mobile calculator

Implement each API as Azure B2C Application

To build an application or an API, that accepts consumer sign-up and sign-in, you first need to register the application with an Azure AD B2C tenant. The steps are straightforward, starting from Azure B2C service:

  • Select Applications, and then select Add.
  • Enter a name for the application.
  • Redirect URI

Depending on the scenario you can select “Implicit flow” for Single page application, or “Include Native API” for mobile application.

Use the library for authentication

For each type of application, there is a free (and open source) library that will save your day, avoiding you having to reinvent the wheel.

Solution Library Name Repository
Web API .NET Core ASP.NET Core OpenId Connect Library https://www.nuget.org/packages/AspNet.Security.OpenIdConnect.Server
Single Page App MSAL for js (Microsoft Authentication Library) https://github.com/AzureAD/microsoft-authentication-library-for-js
Client Xamarin MSAL for .NET (Microsoft Authentication Library) https://www.nuget.org/packages/Microsoft.Identity.Client/

Configure ValidAudiences for API2API call

By default, Microsoft.AspNetCore.Authentication.JwtBearer middleware verifies if the token and the API audience match. This means that in a cross API call, that happens i.e. when WebCalculator calls ApiScientificCalculator using the same bearer, you will receive the following message:

AuthenticationFailed: IDX10214: Audience validation failed. Audiences: '<guid>'. Did not match: validationParameters.ValidAudience: '<guid>' or validationParameters.ValidAudiences: 'null'.

This is because both clientid “WebCalculator” and clientid “APIScientificCalculator” want to access the same API (APICalculator).

In order to avoid this, in ValidAudiences we have to enumerate all the Audiences authorized to use the API.

Looking at schema above, API Calculator and API Scientific Calculator are backend API called by different services, so more validaudiences must be set.

API Valid Audiences
Calculator Calculator - ScientificCalculator - WebCalculator - postman
ScientificCalculator ScientificCalculator - WebCalculator - postman

For the Calculator API, In calculatorAPI>Startup>ConfigureServices, you need to add the following

var tokenValidationParameters = new TokenValidationParameters
            {
                RequireExpirationTime = true,
                RequireSignedTokens = true,
                SaveSigninToken = false,
                ValidateActor = false,
                ValidateAudience = true,
                ValidateIssuer = true,
                ValidateIssuerSigningKey = false,
                ValidateLifetime = true,
                ValidAudiences = new string[] {
                    Configuration["AzureAdB2C:ClientId"],   // API Calculator
                    "9f3d61b2-e38e-4c22-88ed-3f6735e40e0a", // API Scientific Calculator
                    "c07391de-3205-4496-a704-4607b18b64f9",  // WebCalculator 
                    "d668afda-f613-43f7-89e4-5425496ebdf2", // postman
                }
            };

services.AddAuthentication(options =>
            {
                options.DefaultScheme = JwtBearerDefaults.AuthenticationScheme;
            }).AddJwtBearer(jwtOptions =>
              {
                  jwtOptions.Authority = $"https://login.microsoftonline.com/tfp/{Configuration["AzureAdB2C:Tenant"]}/{Configuration["AzureAdB2C:Policy"]}/v2.0/";
                  jwtOptions.Audience = Configuration["AzureAdB2C:ClientId"];
                  jwtOptions.TokenValidationParameters = tokenValidationParameters;
                  jwtOptions.Events = new JwtBearerEvents
                  {
                      OnAuthenticationFailed = AuthenticationFailed
                  };
              });

While for the Scientific Calculator API, you need to add:


var tokenValidationParameters = new TokenValidationParameters
            {
                RequireExpirationTime = true,
                RequireSignedTokens = true,
                SaveSigninToken = false,
                ValidateActor = false,
                ValidateAudience = true,
                ValidateIssuer = true,
                ValidateIssuerSigningKey = false,
                ValidateLifetime = true,
                ValidAudiences = new string[] {
                    Configuration["AzureAdB2C:ClientId"],    // API Scientific Calculator
                    "c07391de-3205-4496-a704-4607b18b64f9",  // WebCalculator 
                    "d668afda-f613-43f7-89e4-5425496ebdf2",  // postman
                }
            };

            services.AddAuthentication(options =>
            {
                options.DefaultScheme = JwtBearerDefaults.AuthenticationScheme;
            }).AddJwtBearer(jwtOptions =>
            {
                jwtOptions.Authority = $"https://login.microsoftonline.com/tfp/{Configuration["AzureAdB2C:Tenant"]}/{Configuration["AzureAdB2C:Policy"]}/v2.0/";
                jwtOptions.Audience = Configuration["AzureAdB2C:ClientId"];
                jwtOptions.TokenValidationParameters = tokenValidationParameters; // ADD THIS LINE TOO
                jwtOptions.Events = new JwtBearerEvents
                {
                    OnAuthenticationFailed = AuthenticationFailed
                };
            });