Skip to content
Trouble with OAuth 2.0 in the browser? Watch Web Security and BFF with Philippe De Ryck.

Customizing Client Credentials Token Management

The most common way to use the access token management for machine-to-machine communication. However, you may want to customize certain aspects of it.

You can add token client definitions to your host while configuring the DotNet service provider, e.g.:

Program.cs
services.AddClientCredentialsTokenManagement()
.AddClient("invoices", client =>
{
client.TokenEndpoint = new Uri("https://sts.company.com/connect/token");
client.ClientId = ClientId.Parse("4a632e2e-0466-4e5a-a094-0455c6105f57");
client.ClientSecret = ClientSecret.Parse("e8ae294a-d5f3-4907-88fa-c83b3546b70c");
client.ClientCredentialStyle = ClientCredentialStyle.AuthorizationHeader;
client.Scope = Scope.Parse("list");
client.Resource = Resource.Parse("urn:invoices");
});

You can set the following options:

  • TokenEndpoint - URL of the OAuth token endpoint where this token client requests tokens from
  • ClientId - client ID
  • ClientSecret - client secret (if a shared secret is used)
  • ClientCredentialStyle - Specifies how the client ID / secret is sent to the token endpoint. Options are using the authorization header, or POST body values (defaults to header)
  • Scope - the requested scope of access (if any)
  • Resource - the resource indicator (if any)

Internally the standard .NET options system is used to register the configuration. This means you can also register clients like this:

Program.cs
services.Configure<ClientCredentialsClient>("invoices", client =>
{
client.TokenEndpoint = new Uri("https://sts.company.com/connect/token");
client.ClientId = ClientId.Parse("4a632e2e-0466-4e5a-a094-0455c6105f57");
client.ClientSecret = ClientSecret.Parse("e8ae294a-d5f3-4907-88fa-c83b3546b70c");
client.Scope = Scope.Parse("list");
client.Resource = Resource.Parse("urn:invoices");
});

Or use the IConfigureNamedOptions if you need access to the ASP.NET Core service provider during registration, e.g.:

ClientCredentialsClientConfigureOptions.cs
using Duende.AccessTokenManagement;
using Duende.IdentityModel.Client;
using Microsoft.Extensions.Options;
public class ClientCredentialsClientConfigureOptions(DiscoveryCache cache)
: IConfigureNamedOptions<ClientCredentialsClient>
{
public void Configure(string? name, ClientCredentialsClient options)
{
if (name == "invoices")
{
var disco = cache.GetAsync().GetAwaiter().GetResult();
options.TokenEndpoint = new Uri(disco.TokenEndpoint);
options.ClientId = ClientId.Parse("4a632e2e-0466-4e5a-a094-0455c6105f57");
options.ClientSecret = ClientSecret.Parse("e8ae294a-d5f3-4907-88fa-c83b3546b70c");
options.Scope = Scope.Parse("list");
options.Resource = Resource.Parse("urn:invoices");
}
}
public void Configure(ClientCredentialsClient options)
{
// implement default configure
Configure("", options);
}
}

You will also need to register the config options, for example:

Program.cs
services.AddClientCredentialsTokenManagement();
services.AddSingleton(new DiscoveryCache("https://sts.company.com"));
services.AddSingleton<IConfigureOptions<ClientCredentialsClient>,
ClientCredentialsClientConfigureOptions>();

By default, all backchannel communication will be done using a named client from the HTTP client factory. The name is Duende.AccessTokenManagement.BackChannelHttpClient which is also a constant called ClientCredentialsTokenManagementDefaults.BackChannelHttpClientName.

You can register your own HTTP client with the factory using the above name and thus provide your own custom HTTP client.

The client registration object has two additional properties to customize the HTTP client:

  • HttpClientName - if set, this HTTP client name from the factory will be used instead of the default one
  • HttpClient - allows setting an instance of HttpClient to use. Will take precedence over a client name

In V4, access tokens are cached using HybridCache.

Hybrid cache is a 2 tier cache, with in-memory and remote capabilities. Hybrid cache automatically picks up any IDistributedCache implementation as it’s remote cache. See Distributed Caching in Asp.Net on more information on topic.

By default, we use the default HybridCache implementation. You may want to inject a custom hybrid cache implementation, such as FusionCache.

You can do this either for the entire system:

Program.cs
services.AddSingletonHybridCache>(new MyCustomCacheImplementation());

Or only for Duende.AccessTokenManagement, by using Service Keys:

Program.cs
services.AddSingletonHybridCache>(ServiceProviderKeys.ClientCredentialsTokenCache, new MyCustomCacheImplementation());

By default, cache keys are built up as follows:

{options.CacheKeyPrefix}::{client_name}::{scope}::{resource}

  • options.CacheKeyPrefix can be configured using the ClientCredentialsTokenManagementOptions
  • client_name is the name of the client
  • scope is the scope parameter (if any) that’s used to request the access token.
  • resource is the resource parameter (if any) that’s used to request the access token.

You can implement your own Cache Key generator by implementing a custom IClientCredentialsCacheKeyGenerator and registering this to your service container. This is needed if you’re adding custom parameters to your TokenRequestParameters

You may want to share a remote cache with other parts of the application or even with other applications. In that case, it may be wise to encrypt the access tokens in the remote cache. You can achieve this with a custom serializer.

Program.cs
// Explicitly register a serializer for the client credentials tokens with the hybrid cache
services.AddHybridCache()
.AddSerializer<ClientCredentialsToken, EncryptedHybridCacheSerializer>();
// This example uses data protection api. You'll want to configure this to suit your needs
services.AddDataProtection();
/// <summary>
/// Example on how to implement a serializer that encrypts data using ASP.NET Core Data Protection.
/// </summary>
public class EncryptedHybridCacheSerializer : IHybridCacheSerializer<ClientCredentialsToken>
{
private readonly IDataProtector _protector;
public EncryptedHybridCacheSerializer(IDataProtectionProvider provider)
{
_protector = provider.CreateProtector("ClientCredentialsToken");
}
public ClientCredentialsToken Deserialize(ReadOnlySequence<byte> source)
{
// Convert the sequence to a byte array
var buffer = source.ToArray();
// Unprotect (decrypt) the data
var unprotected = _protector.Unprotect(buffer);
// Deserialize the JSON payload
return JsonSerializer.Deserialize<ClientCredentialsToken>(unprotected)!;
}
public void Serialize(ClientCredentialsToken value, IBufferWriter<byte> target)
{
// Serialize the value to JSON
var json = JsonSerializer.SerializeToUtf8Bytes(value);
// Protect (encrypt) the data
var protectedBytes = _protector.Protect(json);
// Write to the buffer
target.Write(protectedBytes);
}
}
Program.cs
services.AddClientCredentialsTokenManagement(options =>
{
options.CacheLifetimeBuffer = 60;
options.CacheKeyPrefix = "Duende.AccessTokenManagement.Cache::";
});

CacheLifetimeBuffer is a value in seconds that will be subtracted from the token lifetime, e.g. if a token is valid for one hour, it will be cached for 59 minutes only. The cache key prefix is used to construct the unique key for the cache item based on client name, requested scopes and resource.

Finally, you can also replace the caching implementation altogether by registering your own IClientCredentialsTokenCache.