Select theme:
Radzen Blazor applications support authentication and authorization against Azure AD.
To enable Active Directory support in Radzen follow these steps.
You can get the ClientID and TenantID of your application from the Azure Portal in App Registrations.
Add http://localhost:5000/signin-oidc
as a Redirect URI in your Azure app registration. Remember to also register the final Redirect URI after deploying your application.
Radzen allows you to specify what groups can access a specified page.
Once you have enabled Azure AD security for your Radzen Blazor application you can use a data source that requires Azure AD login. To do that you have to set the ClientSecret setting in the Security configuration page.
You can create a client secret from the Azure application settings.
When you define the Azure AD protected data source in Radzen simply check "Azure AD" as authentication method. You don't need to enter any further configuration. Radzen will use the one from the Security settings.
First setup your Azure AD configuration as specified in Microsoft's Secure an ASP.NET Core Blazor WebAssembly standalone app with Azure Active Directory help article. Keep node of the application ID, tenant id and scope name. A key difference from Radzen Server is that you need to create two Azure AD applications - one for the server-side (API) and one for the client-side (front-end).
Radzen allows you to specify what groups can access a specified page.
Important! If you need to access the user role in the server-side project that Radzen generates you have to create the same role in the API Azure AD application that you have created.
In certain configurations Azure AD requires the redirect URI to be HTTPS. In such cases you may see "Invalid location" error after logging in. To solve the problem
https://localhost:5000/signin-oidc
Radzen is free to use. You can also test the premium features for 15 days.
Download NowSelect theme: