Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
C# 8 and .NET Core 3 Projects Using Azure

You're reading from   C# 8 and .NET Core 3 Projects Using Azure Build professional desktop, mobile, and web applications that meet modern software requirements

Arrow left icon
Product type Paperback
Published in Dec 2019
Publisher
ISBN-13 9781789612080
Length 528 pages
Edition 2nd Edition
Languages
Tools
Arrow right icon
Authors (3):
Arrow left icon
Jas Rademeyer Jas Rademeyer
Author Profile Icon Jas Rademeyer
Jas Rademeyer
Dirk Strauss Dirk Strauss
Author Profile Icon Dirk Strauss
Dirk Strauss
Paul Michaels Paul Michaels
Author Profile Icon Paul Michaels
Paul Michaels
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Ebook Manager and Catalogue App - .NET Core for Desktop FREE CHAPTER 2. Task Bug Logging ASP.NET Core MVC App Using Cosmos DB 3. ASP.NET Azure SignalR Chat Application 4. Web Research Tool with Entity Framework Core 5. Building a Twitter Automated Campaign Manager Using Azure Logic Apps and Functions 6. Stock Checker Using Identity Server and OAuth 2 7. Building a Photo Storage App Using a Windows Service and Azure Storage 8. A Load-Balanced Order Processing Microservice Using Docker and Azure Kubernetes Service 9. Emotion Detector Mobile App - Using Xamarin Forms and Azure Cognitive Services 10. Eliza for the 21st Century - UWP and the MS Bot Framework 11. WebAssembly 12. Other Books You May Enjoy

Summary

That was a mammoth ride. We set up a functional application for our small company, we secured access using IdentityServer 4, and we implemented permissions using roles.

I've said it a few times in this chapter, but just to conclude: when it comes to identity, and indeed security in general, there is no one right answer. IdentityServer makes sense in this case because we used an application and API owned and maintained by the company, we needed offline access, and we were supporting a desktop application. If you change just one of those parameters, it might make sense to use Google OAuth or Azure B2C.

To reiterate something else that I've also stated several times: security of any kind isn't an absolute. Your system might be very secure as it may use encrypted traffic and firewalls. However, you may have put your application through penetration testing and...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime