Skip to Content

Dynamic Authentication Providers - Open Beta

One issue we hear a lot from our customers is the inability to add and configure external identity providers during runtime. Sure, IAuthenticationSchemeProvider can be used to add more providers in-memory, but, out of the box, this is volatile and not made available across multiple instances of the same app. To solve this, Rock Solid Knowledge have developed a new component for ASP.NET Core called Dynamic Authentication Providers (DAPs).

The DAPs component allows you to add new authentication configurations during runtime. Designed to work with the ASP.NET Core authentication system, it is suitable for both plain ASP.NET Core applications and IdentityServer4.

DAPs is now entering beta and is available for beta testing. Out of the box it has support for:

  • adding new OpenID Connect, WS-Federation, and SAML identity providers
  • a basic caching layer
  • an Entity Framework and JSON store

If you want to get started with this component, we have a demo license key available for the duration of the public beta (ends 22nd July), otherwise, you can get in contact with regarding commercials.


To get started with the Dynamic Authentication Providers component, see the below code example. Here we use a local cookie, and add support for OpenID Connect and SAML 2.0 identity providers that are loaded from a JSON file.

You can find full installation details in our quickstart documentation, along with details on caching, and how to enable other authentication providers to be used as DAPs providers.

public class Startup
    public void ConfigureServices(IServiceCollection services)


        services.AddDynamicProviders() // Component setup
            .AddJsonStore(options => options.Path = "schemes.json") // JSON store 
            .AddOpenIdConnect() // Add OIDC support
            .AddSaml(); // Add SAML support
    public void Configure(IApplicationBuilder app)

With the JSON file looking like the following which sets up an OpenID Connect provider for the dynamicauth-quickstart client of the authority:

    "Name": "openid-1",
    "DisplayName": "OpenID",
    "HandlerType": "Microsoft.AspNetCore.Authentication.OpenIdConnect.OpenIdConnectHandler, 
    Microsoft.AspNetCore.Authentication.OpenIdConnect, Version=, Culture=neutral, PublicKeyToken=adb9793829ddae60",
    "Options": {
      "Authority": "",
      "ClientId": "dynamicauth-quickstart",
      "ResponseType": "id_token token",
      "Scope": [ "openid", "profile", "api1" ],
      "CallbackPath": "/signin/dynamic/openid-1" ,
      "SignInScheme": "cookie"

You can find more examples in our samples repository on GitHub, or by working through our quickstarts.

Last updated: July 8, 2019

  • Hawkins Inc
  • Repower
  • Bosch
  • RandA
  • Plymouth NHS
  • American Heart Association
  • Systopia
  • Deliotte

We are proud to be a Certified B Corporation, meeting the highest standards of social and environmental impact.

Find Out More

Awards & Certifications