Skip to main content

Validating configuration at startup with IValidateOptions in .NET

When you build .NET applications with strongly typed configuration, IOptions<T> and its variants give you a clean way to bind appsettings.json sections to C# classes. But binding isn't the same as validating - a missing required value or an out-of-range number will happily bind to a default and silently break your app at runtime. IValidateOptions<T> is the hook .NET provides to fix that.

The problem: silent misconfiguration

Consider a typical options class:

If Host is missing from appsettings.json, your app starts fine. The failure surfaces only when the first email is sent — in production, at 2 AM. Data Annotations ([Required], [Range]) combined with ValidateDataAnnotations() help, but they fall short when you need:

  • Cross-property validation (e.g., Port must be 465 when UseSsl is true)
  • Async or database-backed checks
  • Conditional logic depending on environment
  • Reusable validators shared across multiple options types

This is where IValidateOptions<T> comes in.

What is IValidateOptions<T>?

IValidateOptions<T> is an interface in Microsoft.Extensions.Options with a single method:

You implement this interface in a dedicated class, register it in the DI container, and the Options infrastructure calls it automatically — either lazily (on first access) or eagerly at startup when combined with ValidateOnStart().

Basic example

Here is a minimal validator for the SMTP options class above:

Register it alongside the options binding in Program.cs:

If validation fails, OptionsValidationException is thrown during app.Run(), so your service never starts with bad config — a much better failure mode than a runtime NullReferenceException deep in your domain logic.

Accessing other services inside a validator

Because the validator is a regular DI-registered class, you can inject dependencies. This is one of the key advantages over Data Annotations, which have no access to the container.

Cross-property validation

This is where IValidateOptions<T> really pulls ahead. Data Annotations cannot express constraints between properties.

Named options

IValidateOptions<T> supports named options via the name parameter. This matters when you register multiple instances of the same options type — for example, two different upstream API clients.

Registration with named options:

Combining with OptionsBuilder<T>

The OptionsBuilder<T> API (returned by AddOptions<T>()) has a .Validate() overload that accepts a delegate. This is fine for simple cases. For anything non-trivial, the dedicated IValidateOptions<T> class is preferable — it keeps validation logic testable and out of Program.cs.

You can stack both on the same options type — the framework runs all registered validators and aggregates the failures.

Summary

IValidateOptions<T> is the right tool when your configuration validation requirements outgrow what Data Annotations can express. The main takeaways:

  • Implement IValidateOptions<T> in a dedicated class and register it as a singleton.
  • Use ValidateOnStart() to catch misconfiguration at startup rather than at first use.
  • Inject services freely — environment, logging, or even a config service — because the validator is a first-class DI citizen.
  • Express cross-property constraints and conditional logic without fighting the attribute model.
  • Write focused unit tests against the validator class in total isolation from the host.

For most production .NET applications, reaching for IValidateOptions<T> over inline .Validate() delegates pays dividends the first time a broken config would have slipped into a staging or production deploy.

More information

Options pattern - .NET | Microsoft Learn

Popular posts from this blog

Kubernetes–Limit your environmental impact

Reducing the carbon footprint and CO2 emission of our (cloud) workloads, is a responsibility of all of us. If you are running a Kubernetes cluster, have a look at Kube-Green . kube-green is a simple Kubernetes operator that automatically shuts down (some of) your pods when you don't need them. A single pod produces about 11 Kg CO2eq per year( here the calculation). Reason enough to give it a try! Installing kube-green in your cluster The easiest way to install the operator in your cluster is through kubectl. We first need to install a cert-manager: kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml Remark: Wait a minute before you continue as it can take some time before the cert-manager is up & running inside your cluster. Now we can install the kube-green operator: kubectl apply -f https://github.com/kube-green/kube-green/releases/latest/download/kube-green.yaml Now in the namespace where we want t...

Azure DevOps/ GitHub emoji

I’m really bad at remembering emoji’s. So here is cheat sheet with all emoji’s that can be used in tools that support the github emoji markdown markup: All credits go to rcaviers who created this list.

Podman– Command execution failed with exit code 125

After updating WSL on one of the developer machines, Podman failed to work. When we took a look through Podman Desktop, we noticed that Podman had stopped running and returned the following error message: Error: Command execution failed with exit code 125 Here are the steps we tried to fix the issue: We started by running podman info to get some extra details on what could be wrong: >podman info OS: windows/amd64 provider: wsl version: 5.3.1 Cannot connect to Podman. Please verify your connection to the Linux system using `podman system connection list`, or try `podman machine init` and `podman machine start` to manage a new Linux VM Error: unable to connect to Podman socket: failed to connect: dial tcp 127.0.0.1:2655: connectex: No connection could be made because the target machine actively refused it. That makes sense as the podman VM was not running. Let’s check the VM: >podman machine list NAME         ...