ASP.NET AllowAnonymous
last modified April 3, 2025
In this article, we explore the AllowAnonymous attribute in ASP.NET 8. This attribute bypasses authorization requirements for specific controller actions.
ASP.NET provides robust authentication and authorization features. AllowAnonymous is used when you need to make certain endpoints accessible without authentication.
Basic Definition
The AllowAnonymous attribute in ASP.NET indicates that a controller or action method should skip authorization checks. It overrides any authorization policies.
When applied to a controller or action, it allows anonymous access even when the controller or application requires authentication. This is useful for public endpoints like login pages.
AllowAnonymous is part of ASP.NET's authorization system. It works with both traditional and attribute-based authorization approaches in .NET 8 applications.
ASP.NET AllowAnonymous Example
The following example demonstrates using AllowAnonymous in a Web API controller.
var builder = WebApplication.CreateBuilder(args); builder.Services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme) .AddJwtBearer(options => { options.TokenValidationParameters = new TokenValidationParameters { ValidateIssuer = true, ValidateAudience = true, ValidateLifetime = true, ValidateIssuerSigningKey = true, ValidIssuer = builder.Configuration["Jwt:Issuer"], ValidAudience = builder.Configuration["Jwt:Audience"], IssuerSigningKey = new SymmetricSecurityKey( Encoding.UTF8.GetBytes(builder.Configuration["Jwt:Key"])) }; }); builder.Services.AddControllers(); var app = builder.Build(); app.UseAuthentication(); app.UseAuthorization(); app.MapControllers(); app.Run();
This sets up JWT bearer authentication for the application. The authentication middleware is added before authorization to ensure proper request processing.
using Microsoft.AspNetCore.Authorization; using Microsoft.AspNetCore.Mvc; using System.IdentityModel.Tokens.Jwt; using System.Security.Claims; using Microsoft.IdentityModel.Tokens; [ApiController] [Route("api/[controller]")] public class AuthController : ControllerBase { private readonly IConfiguration _config; public AuthController(IConfiguration config) { _config = config; } [AllowAnonymous] [HttpPost("login")] public IActionResult Login([FromBody] LoginModel login) { // In a real app, validate credentials against database if (login.Username != "admin" || login.Password != "password") return Unauthorized(); var token = GenerateJwtToken(login.Username); return Ok(new { Token = token }); } [Authorize] [HttpGet("profile")] public IActionResult GetProfile() { var username = User.Identity.Name; return Ok(new { Username = username, Message = "Secure data" }); } private string GenerateJwtToken(string username) { var claims = new[] { new Claim(ClaimTypes.Name, username), new Claim(ClaimTypes.Role, "User") }; var key = new SymmetricSecurityKey( Encoding.UTF8.GetBytes(_config["Jwt:Key"])); var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256); var token = new JwtSecurityToken( issuer: _config["Jwt:Issuer"], audience: _config["Jwt:Audience"], claims: claims, expires: DateTime.Now.AddMinutes(30), signingCredentials: creds); return new JwtSecurityTokenHandler().WriteToken(token); } } public record LoginModel(string Username, string Password);
This controller shows two endpoints: one public login endpoint and one secure profile endpoint. The login endpoint is marked with AllowAnonymous to permit unauthenticated access.
The Login
action generates a JWT token after validating credentials.
The GetProfile
action requires authentication, as indicated by the
Authorize attribute.
The example demonstrates how AllowAnonymous can be used alongside Authorize in the same controller. This pattern is common for authentication-related endpoints.
Source
Microsoft ASP.NET Authorization Documentation
In this article, we have explored the AllowAnonymous attribute in ASP.NET 8. This essential feature enables flexible authorization configurations in web applications.
Author
List all ASP.NET tutorials.