Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning ASP.NET Core 2.0

You're reading from   Learning ASP.NET Core 2.0 Build modern web apps with ASP.NET Core 2.0, MVC, and EF Core 2

Arrow left icon
Product type Paperback
Published in Dec 2017
Publisher Packt
ISBN-13 9781788476638
Length 516 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (2):
Arrow left icon
Michel Bruchet Michel Bruchet
Author Profile Icon Michel Bruchet
Michel Bruchet
Jason De Oliveira Jason De Oliveira
Author Profile Icon Jason De Oliveira
Jason De Oliveira
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. What is ASP.NET Core 2.0? FREE CHAPTER 2. Setting Up the Environment 3. Creating a Continuous Integration Pipeline in VSTS 4. Basic Concepts of ASP.NET Core 2.0 - Part 1 5. Basic Concepts of ASP.NET Core 2.0 - Part 2 6. Creating MVC Applications 7. Creating Web API Applications 8. Accessing Data using Entity Framework Core 2 9. Securing ASP.NET Core 2.0 Applications 10. Hosting and Deploying ASP.NET Core 2.0 Applications 11. Managing and Supervising ASP.NET Core 2.0 Applications

Summary


In this chapter, you have learned how to secure ASP.NET Core 2.0 applications, including managing authentication and authorization for your application users.

You have added basic forms authentication, and more advanced external provider authentication via Facebook, to the example application. This should give you some good ideas on how to approach these important topics in your own applications.

Furthermore, you have learned how to add standard reset password mechanisms, because users forget their passwords all the time and you need to respond to this type of request as securely as possible.

We have even talked about two-factor authentication, which can provide an even higher security level for critical applications.

In the end, you have seen how to handle authorizations in multiple ways (basic, roles, policies), so that you can decide which approach is best suited to your specific use case.

In the next chapter, we will talk about the different options you will have when hosting and...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime