Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Enterprise Application Architecture with .NET Core

You're reading from   Enterprise Application Architecture with .NET Core An architectural journey into the Microsoft .NET open source platform

Arrow left icon
Product type Paperback
Published in Apr 2017
Publisher Packt
ISBN-13 9781786468888
Length 564 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (4):
Arrow left icon
Ganesan Senthilvel Ganesan Senthilvel
Author Profile Icon Ganesan Senthilvel
Ganesan Senthilvel
Adwait Ullal Adwait Ullal
Author Profile Icon Adwait Ullal
Adwait Ullal
Habib Qureshi Habib Qureshi
Author Profile Icon Habib Qureshi
Habib Qureshi
Ovais Mehboob Ahmed Khan Ovais Mehboob Ahmed Khan
Author Profile Icon Ovais Mehboob Ahmed Khan
Ovais Mehboob Ahmed Khan
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Enterprise Architecture Concepts FREE CHAPTER 2. Principles and Patterns 3. Distributed Computing 4. Software Development Life Cycle 5. Enterprise Practices in Software Development 6. Layered Approach to Solution Architecture 7. SOA Implementation with .NET Core 8. Cloud-Based Architecture and Integration with .NET Core 9. Microservices Architecture 10. Security Practices with .NET Core 11. Modern AI Offerings by Microsoft

Understanding the authentication and authorization process

ASP.NET Identity Core makes a vital shift in the way that authentication works with the previous versions. In earlier versions, current users of the request are of the IPrincipal type that can be retrieved through the HttpContext object, whereas with ASP.NET Core Identity, the user is of the ClaimsPrincipal type that implements IPrincipal. In previous versions, authorization was typically role-based, whereas now it's completely claims-based and known as ClaimsIdentity. The ClaimsIdentity object contains a list of claims that the user has, for example, first name, last name, e-mail address, bank account, and phone number are some of the popular claims, but there are many more. A claim is nothing but a key value pair that can be defined using the Claim object. Claims are used to represent the properties of the user that can be used further for authorization...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime