ASP.NET Core 2.0 - Windows Auth with LDAP Groups in Role

Has anyone successfully created an ASP.NET Core 2.0 application using Windows Authentication in IIS to query the LDAP source (native AD instance) and put group membership in the role as claims to properly fuel the [Authorize] annotation? The middleware documentation does not directly address how to do this, or dates from some releases of System.DirectoryServices 4.5preview for aspnetcore. I know that the .NET Framework gives us native access to group membership through System.DirectoryService. My question is whether it is possible to try to use a filter instead of middleware and query LDAP for groups and save as cookie claims. Is there an easier way to do this? I have a request to our LDAP source, working in the Novell.Directory.Ldap standard, which I can use where it is needed for iteration.

Thanks in advance for your advice.

+7
authentication iis asp.net-core active-directory iis-express
source share

No one has answered this question yet.

See similar questions:

342
How to create custom AuthorizeAttribute attribute in ASP.NET Core?

or similar:

42
OAuth Authorization Service in ASP.NET Kernel
41
ASP.NET Core 2.0 Authentication Tool
7
Custom cookie authentication does not work after migrating from ASP.NET Core 1.1 MVC to 2.0
3
Special ASP.NET Core 2.0 Middleware Using Cookie Validation
3
Role requirements in ASP.NET core syntax versus role permissions in user mode auth
2
Query database for role authorization before each action in the ASP.NET core
one
ASP.NET Core CRUD for Best Practices
one
What is an AdalDistributedTokenCache when using OpenID Connect in ASP.NET Core 2.0?
0
Unauthorized ASP.NET Mvc Core Project request is not redirected to the login page
0
Authentication Based Authentication in ASP.NET Core 2.0

All Articles