Modern admin UI for Duende IdentityServer and ASP.NET Core Identity.
-
β Stable (production): v2.7.0
https://github.com/skoruba/Duende.IdentityServer.Admin/tree/release/2.7.0 -
π Next generation (v3 β preview) β current prerelease:
3.0.0-preview.22- React + TypeScript + Tailwind CSS + shadcn/ui
- .NET 10 backend REST API
- New monitoring and wizard flows
The UI is built with Tailwind CSS and shadcn/ui components.
Define and track configuration rules for clients, API resources, and identity resources:
- Flag deprecated OAuth 2.1 flows
- Enforce required scopes
- Validate naming conventions
- Warn about expired client secrets
- .NET 10 SDK
- Node.js 18+ and npm (required for the React client)
- SQL Server (default LocalDB) or PostgreSQL
- Duende IdentityServer 7.4.5
Note: Using older .NET versions may cause 502.5 errors on IIS or application startup failures.
π Database note:
This template includes default EF migrations. Review them and back up your database before applying.
βΉοΈ Migration note from IdentityServer4.Admin:
TheUserSecretsIdfor Admin, Admin API, and STS projects remains the same as in the olderSkoruba.IdentityServer4.Adminsolution to ease config migration. If you still have secrets from the old project on your machine, they will be reused (e.g.,ApplySeedcould point at your old DB). Change or clear user secrets if you need isolation.
dotnet new install Skoruba.Duende.IdentityServer.Admin.Templates::3.0.0-preview.22dotnet new skoruba.duende.isadmin \
--name MyProject \
--title MyProject \
--adminemail "admin@example.com" \
--adminpassword "Passw0rd-123" \
--adminrole MyRole \
--adminclientid MyClientId \
--adminclientsecret MyClientSecret \
--dockersupport true \
--requirepushedauthorization true| Option | Description |
|---|---|
--name |
Project name |
--title |
Admin UI title and footer text |
--adminemail |
Initial admin email |
--adminpassword |
Initial admin password |
--adminrole |
Role name used for admin authorization |
--adminclientid |
Client ID for the Admin UI OIDC client |
--adminclientsecret |
Client secret for the Admin UI OIDC client |
--dockersupport |
Include Docker support (true / false) |
--requirepushedauthorization |
Require PAR for admin client (true / false, default true). Note: PAR requires Duende IdentityServer Business Edition or higher. More info |
Note: This section is for developers who want to clone and contribute to the repository. If you want to use the template, see the section above.
The solution contains three runnable services:
| Service | Project | Purpose |
|---|---|---|
| STS | Skoruba.Duende.IdentityServer.STS.Identity |
IdentityServer + authentication |
| Admin API | Skoruba.Duende.IdentityServer.Admin.Api |
REST API backend |
| Admin UI | Skoruba.Duende.IdentityServer.Admin |
SPA host |
git clone https://github.com/skoruba/Duende.IdentityServer.Admin
cd Duende.IdentityServer.Admincd src/Skoruba.Duende.IdentityServer.Admin.UI.Client
npm install
cd ../..Open three terminals and run:
# Terminal 1: STS (IdentityServer)
cd src/Skoruba.Duende.IdentityServer.STS.Identity
dotnet run
# Terminal 2: Admin API
cd src/Skoruba.Duende.IdentityServer.Admin.Api
dotnet run
# Terminal 3: Admin UI Host
cd src/Skoruba.Duende.IdentityServer.Admin
dotnet run| Service | URL |
|---|---|
| STS | https://localhost:44310 |
| Admin API | https://localhost:44302 |
| Admin UI | Check console output (usually https://localhost:7127) |
By default, database migrations and seed data are enabled in Admin API (
ApplyDatabaseMigrations,ApplySeed).
Tip: For the fastest onboarding, use the
dotnet runapproach above. Docker requires custom domain and certificates.
Update your hosts file to resolve skoruba.local:
Windows: C:\Windows\System32\drivers\etc\hosts
Linux / macOS: /etc/hosts
127.0.0.1 skoruba.local sts.skoruba.local admin.skoruba.local admin-api.skoruba.local
Use mkcert to generate self-signed local certificates.
cd shared/nginx/certs
mkcert --install
copy $env:LOCALAPPDATA\mkcert\rootCA-key.pem ./cacerts.pem
copy $env:LOCALAPPDATA\mkcert\rootCA.pem ./cacerts.crt
# Generate skoruba.local certificates
mkcert -cert-file skoruba.local.crt -key-file skoruba.local.key skoruba.local *.skoruba.local
mkcert -pkcs12 skoruba.local.pfx skoruba.local *.skoruba.localcd shared/nginx/certs
mkcert -install
# Copy root certificates (adjust paths for your system)
# macOS: ~/Library/Application\ Support/mkcert/
# Linux: ~/.local/share/mkcert/
cp "$(mkcert -CAROOT)/rootCA-key.pem" ./cacerts.pem
cp "$(mkcert -CAROOT)/rootCA.pem" ./cacerts.crt
# Generate skoruba.local certificates
mkcert -cert-file skoruba.local.crt -key-file skoruba.local.key skoruba.local *.skoruba.local
mkcert -pkcs12 skoruba.local.pfx skoruba.local *.skoruba.localdocker-compose build
docker-compose up -dDocker setup is based on bravecobra's repository β thanks! π
Docker images are available on Docker Hub.
To publish images, check build/publish-docker-images.ps1 and update the profile name.
The solution uses the following DbContext classes:
AdminIdentityDbContextβ ASP.NET Core Identity dataAdminLogDbContextβ Logging dataIdentityServerConfigurationDbContextβ IdentityServer configuration storeIdentityServerPersistedGrantDbContextβ IdentityServer operational storeAuditLoggingDbContextβ Audit loggingIdentityServerDataProtectionDbContextβ Data protection keysAdminConfigurationDbContextβ Admin configuration and monitoring (added in v3.0.0)
- SQL Server (default)
- PostgreSQL
Switch providers in appsettings.json:
"DatabaseProviderConfiguration": {
"ProviderType": "SqlServer"
}SQL Server (LocalDB):
Data Source=(LocalDb)\\MSSQLLocalDB;database=DuendeIdentityServerAdmin;trusted_connection=yes;
PostgreSQL:
Server=localhost;Port=5432;Database=DuendeIdentityServerAdmin;User Id=sa;Password=#;
Note: Initial migrations are included in the repository.
Use the PowerShell script in build/add-migrations.ps1:
.\add-migrations.ps1 -migration DbInit -migrationProviderName SqlServerArguments:
--migrationβ Migration name--migrationProviderNameβ Provider type (choices:All,SqlServer,PostgreSQL)
Seed data is configured in:
identityserverdata.jsonβ IdentityServer clients and resourcesidentitydata.jsonβ ASP.NET Core Identity users and roles
Enable seeding via:
Option 1: Command line
dotnet run /seedOption 2: Configuration (appsettings.json)
"SeedConfiguration": {
"ApplySeed": true
},
"DatabaseMigrationsConfiguration": {
"ApplyDatabaseMigrations": true
}- Admin policy:
AuthorizationConsts.AdministrationPolicy - Required role configured in
AdministrationRole(appsettings.json) - Admin UI authenticates via OIDC against STS
- Admin UI calls Admin API using client credentials
Configuration in appsettings.json:
"AdministrationRole": "SkorubaIdentityAdminAdministrator"Azure Key Vault supports:
- Configuration secrets
- Data Protection keys
- IdentityServer signing certificates
"AzureKeyVaultConfiguration": {
"AzureKeyVaultEndpoint": "https://your-vault.vault.azure.net/",
"ReadConfigurationFromKeyVault": true,
"ClientId": "",
"ClientSecret": "",
"UseClientCredentials": true
}For Azure App Service: Only specify AzureKeyVaultEndpoint.
Outside Azure: Use client credentials (register app in Azure Portal).
"DataProtectionConfiguration": {
"ProtectKeysWithAzureKeyVault": true
},
"AzureKeyVaultConfiguration": {
"DataProtectionKeyIdentifier": "https://your-vault.vault.azure.net/keys/dataprotection"
}"AzureKeyVaultConfiguration": {
"IdentityServerCertificateName": "IdentityServerSigningCert"
}Uses Serilog with the following sinks (configured in serilog.json):
- Console
- File
- MSSqlServer
- Seq
Example configuration:
{
"Serilog": {
"MinimumLevel": {
"Default": "Error",
"Override": {
"Skoruba": "Information"
}
},
"WriteTo": [
{
"Name": "Console"
},
{
"Name": "File",
"Args": {
"path": "log.txt",
"rollingInterval": "Day"
}
},
{
"Name": "MSSqlServer",
"Args": {
"connectionString": "...",
"tableName": "Log"
}
}
]
}
}Integrated via skoruba/AuditLogging.
Configuration in appsettings.json:
"AuditLoggingConfiguration": {
"Source": "IdentityServer.Admin.Web",
"SubjectIdentifierClaim": "sub",
"SubjectNameClaim": "name",
"IncludeFormVariables": false
}Audit logs are stored in the AuditLog table.
Usage example:
await AuditEventLogger.LogEventAsync(new ClientDeletedEvent(client));Configure external providers in STS (appsettings.json):
"ExternalProvidersConfiguration": {
"UseGitHubProvider": false,
"GitHubClientId": "",
"GitHubClientSecret": "",
"UseAzureAdProvider": false,
"AzureAdClientId": "",
"AzureAdTenantId": "",
"AzureInstance": "https://login.microsoftonline.com/",
"AzureAdSecret": "",
"AzureAdCallbackPath": "/signin-oidc",
"AzureDomain": ""
}Supported providers:
- GitHub
- Azure AD
- Any provider via aspnet-contrib/AspNet.Security.OAuth.Providers
Azure AD setup guide:
Quickstart: Sign in users in ASP.NET Core web apps
"SendgridConfiguration": {
"ApiKey": "",
"SourceEmail": "",
"SourceName": ""
}"SmtpConfiguration": {
"From": "",
"Host": "",
"Login": "",
"Password": ""
}All services expose a /health endpoint for monitoring:
- Admin UI:
https://localhost:7127/health - Admin API:
https://localhost:44302/health - STS:
https://localhost:44310/health
Checks include:
- Database connectivity
- IdentityServer availability
Translations are stored in /i18n.
Currently supported:
- English
Contributing translations:
Feel free to submit a PR with your translation! π
Swagger UI is available at:
https://localhost:44302/swagger
Configuration (appsettings.json):
"AdminApiConfiguration": {
"IdentityServerBaseUrl": "https://localhost:44310",
"OidcSwaggerUIClientId": "skoruba_identity_admin_api_swaggerui",
"OidcApiName": "skoruba_identity_admin_api"
}Choose between Username or Email login:
"LoginConfiguration": {
"ResolutionPolicy": "Username"
}Enable or disable user registration:
"RegisterConfiguration": {
"Enabled": true
}The solution contains unit and integration tests for all major components.
Skoruba.Duende.IdentityServer.STS.Identity β IdentityServer with ASP.NET Core Identity
Skoruba.Duende.IdentityServer.Admin.Api β REST API with Swagger
Skoruba.Duende.IdentityServer.Adminβ .NET hostSkoruba.Duende.IdentityServer.Admin.UIβ UI servicesSkoruba.Duende.IdentityServer.Admin.UI.Spaβ Precompiled React assetsSkoruba.Duende.IdentityServer.Admin.UI.Clientβ React source code
Skoruba.Duende.IdentityServer.Admin.BusinessLogicβ IdentityServer DTOs, services, repositoriesSkoruba.Duende.IdentityServer.Admin.BusinessLogic.Identityβ Identity DTOs, services, repositoriesSkoruba.Duende.IdentityServer.Admin.BusinessLogic.Sharedβ Shared logic
Skoruba.Duende.IdentityServer.Admin.EntityFrameworkβ Core EF entitiesSkoruba.Duende.IdentityServer.Admin.EntityFramework.Configurationβ Entity configurationsSkoruba.Duende.IdentityServer.Admin.EntityFramework.Extensionsβ EF extensionsSkoruba.Duende.IdentityServer.Admin.EntityFramework.Identityβ Identity repositoriesSkoruba.Duende.IdentityServer.Admin.EntityFramework.Sharedβ DbContextsSkoruba.Duende.IdentityServer.Admin.EntityFramework.SqlServerβ SQL Server migrationsSkoruba.Duende.IdentityServer.Admin.EntityFramework.PostgreSQLβ PostgreSQL migrations
Skoruba.Duende.IdentityServer.Sharedβ Shared DTOsSkoruba.Duende.IdentityServer.Shared.Configurationβ Shared configuration
Skoruba.Duende.IdentityServer.Admin.UnitTestsβ Unit testsSkoruba.Duende.IdentityServer.Admin.Api.IntegrationTestsβ API integration testsSkoruba.Duende.IdentityServer.STS.IntegrationTestsβ STS integration tests
For detailed release history and upcoming features, see CHANGELOG.md.
Upcoming releases:
- Passkeys support (251)
- Add support for importing/exporting IdentityServer data in JSON format (20)
- DTO refactoring
- Removal of AutoMapper and FluentAssertions
- Additional translations for the Admin UI
- Claims management UI (#22)
- Identity management improvements β added options for loading a custom Identity schema
- Minimal API rewrite (Vertical Slice Architecture)
This repository is licensed under Apache License 2.0.
Duende IdentityServer is available under both a FOSS (RPL) and commercial license.
For production environments, you need a specific license. More info:
https://duendesoftware.com/products/identityserver#pricing
This repository uses source code from:
https://github.com/DuendeSoftware/IdentityServer.Quickstart.UI
Licensed under: https://github.com/DuendeSoftware/IdentityServer.Quickstart.UI/blob/main/LICENSE
Thanks to:
- TomΓ‘Ε‘ HΓΌbelbauer for initial code review
- Dominick Baier and Brock Allen β creators of Duende IdentityServer
- All contributors π
Author: Jan Ε koruba
Email: jan@skoruba.com
Feedback is welcome! Feel free to create an issue or send me an email. Thank you!
If you like this project, you can support me:
- GitHub Sponsors: https://github.com/sponsors/skoruba
- PayPal: https://www.paypal.me/skoruba
- Patreon: https://www.patreon.com/skoruba








