- Notifications
You must be signed in to change notification settings - Fork88
Add comprehensive documentation and examples for user identification architecture#17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Draft
Copilot wants to merge2 commits intomainChoose a base branch fromcopilot/fix-92cc1f10-3036-422e-a9bc-46e4ced41ddb
base:main
Could not load branches
Branch not found:{{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline, and old review comments may become outdated.
Uh oh!
There was an error while loading.Please reload this page.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.Learn more about bidirectional Unicode characters
Important Review skippedBot user detected. To trigger a single review, invoke the You can disable this status message by setting the Comment |
Co-authored-by: nadirbad <33620914+nadirbad@users.noreply.github.com>
CopilotAI changed the title[WIP] identityAdd comprehensive documentation and examples for user identification architectureOct 2, 2025
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading.Please reload this page.
This PR addresses the question about where user identification is positioned and implemented in this Vertical Slice Architecture by providing comprehensive documentation and working examples.
Changes Made
📚New Documentation
docs/UserIdentificationArchitecture.md- Complete guide explaining how user identification works in this architecture, including:ICurrentUserService,AuthorizationBehaviour)docs/AddingAuthenticationExample.md- Step-by-step guide for implementing JWT authentication while following vertical slice patterns:🔧Working Example
src/Application/Features/TodoLists/GetMyTodoLists.cs- New feature demonstrating:[Authorize]attribute to protect endpointsICurrentUserService📖Updated README
Added new section linking to the documentation with overview of user identification capabilities.
Key Architectural Insights
The user identification system is positioned as across-cutting concern across multiple layers:
ICurrentUserServiceextracts user from HTTP context claimsAuthorizationBehaviourautomatically enforces authentication for[Authorize]decorated requestsApplicationDbContextautomatically populates audit fields (CreatedBy/LastModifiedBy)Current State
The architecture provides all theinfrastructure for user identification but intentionally leaves the authentication mechanism flexible:
[Authorize]attributesThis design allows developers to choose their preferred authentication approach while leveraging the existing user identification infrastructure that automatically handles authorization, auditing, and user context throughout the application.
The new
/api/my-todo-listsendpoint visible in Swagger demonstrates the system working - it's protected by authorization and filters results by the current user, showcasing how user identification integrates seamlessly with business logic.Original prompt
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn moreCopilot coding agent tips in the docs.