Create Tool:
Create Time:2024-11-27 19:42:31
File Size:1602.11 MB
File Count:335
File Hash:13b7e481171dee26a45b08cfd49d0b61e659acb3
01. Course Overview/01. Course Overview.mp4 | 3.36 MB |
01. Course Overview/01. Course Overview.srt | 2.18 KB |
02. Getting Started with ASP.NET Core Security/01. Coming Up.mp4 | 6.36 MB |
02. Getting Started with ASP.NET Core Security/01. Coming Up.srt | 4.88 KB |
02. Getting Started with ASP.NET Core Security/02. Positioning This Course.mp4 | 2.42 MB |
02. Getting Started with ASP.NET Core Security/02. Positioning This Course.srt | 2.51 KB |
02. Getting Started with ASP.NET Core Security/03. Course Prerequisites.mp4 | 1003.18 KB |
02. Getting Started with ASP.NET Core Security/03. Course Prerequisites.srt | 1.20 KB |
02. Getting Started with ASP.NET Core Security/04. Frameworks and Tooling.mp4 | 4.88 MB |
02. Getting Started with ASP.NET Core Security/04. Frameworks and Tooling.srt | 3.58 KB |
02. Getting Started with ASP.NET Core Security/05. Application Architectures and Security.mp4 | 12.70 MB |
02. Getting Started with ASP.NET Core Security/05. Application Architectures and Security.srt | 12.71 KB |
02. Getting Started with ASP.NET Core Security/06. Working Towards a Central Identity Provider.mp4 | 8.25 MB |
02. Getting Started with ASP.NET Core Security/06. Working Towards a Central Identity Provider.srt | 7.43 KB |
02. Getting Started with ASP.NET Core Security/07. Introducing OAuth2.mp4 | 3.76 MB |
02. Getting Started with ASP.NET Core Security/07. Introducing OAuth2.srt | 3.61 KB |
02. Getting Started with ASP.NET Core Security/08. Introducing OpenID Connect.mp4 | 2.65 MB |
02. Getting Started with ASP.NET Core Security/08. Introducing OpenID Connect.srt | 2.74 KB |
02. Getting Started with ASP.NET Core Security/09. Demo - Introducing the Demo Application.mp4 | 10.52 MB |
02. Getting Started with ASP.NET Core Security/09. Demo - Introducing the Demo Application.srt | 7.14 KB |
02. Getting Started with ASP.NET Core Security/10. Summary.mp4 | 1.38 MB |
02. Getting Started with ASP.NET Core Security/10. Summary.srt | 1.25 KB |
03. Understanding Authentication with OpenID Connect/01. Coming Up.mp4 | 1.10 MB |
03. Understanding Authentication with OpenID Connect/01. Coming Up.srt | 876 B |
03. Understanding Authentication with OpenID Connect/02. Learning How OpenID Connect Works.mp4 | 3.69 MB |
03. Understanding Authentication with OpenID Connect/02. Learning How OpenID Connect Works.srt | 4.28 KB |
03. Understanding Authentication with OpenID Connect/03. Confidential and Public Clients.mp4 | 3.93 MB |
03. Understanding Authentication with OpenID Connect/03. Confidential and Public Clients.srt | 3.39 KB |
03. Understanding Authentication with OpenID Connect/04. OpenID Connect Flows and Endpoints.mp4 | 18.00 MB |
03. Understanding Authentication with OpenID Connect/04. OpenID Connect Flows and Endpoints.srt | 15.88 KB |
03. Understanding Authentication with OpenID Connect/05. Introducing Duende IdentityServer.mp4 | 9.30 MB |
03. Understanding Authentication with OpenID Connect/05. Introducing Duende IdentityServer.srt | 4.36 KB |
03. Understanding Authentication with OpenID Connect/06. Demo - Setting Up IdentityServer.mp4 | 23.39 MB |
03. Understanding Authentication with OpenID Connect/06. Demo - Setting Up IdentityServer.srt | 14.17 KB |
03. Understanding Authentication with OpenID Connect/07. Demo - Adding a User Interface.mp4 | 8.70 MB |
03. Understanding Authentication with OpenID Connect/07. Demo - Adding a User Interface.srt | 4.48 KB |
03. Understanding Authentication with OpenID Connect/08. Demo - Adding Users to Test With.mp4 | 9.95 MB |
03. Understanding Authentication with OpenID Connect/08. Demo - Adding Users to Test With.srt | 6.02 KB |
03. Understanding Authentication with OpenID Connect/09. Summary.mp4 | 4.07 MB |
03. Understanding Authentication with OpenID Connect/09. Summary.srt | 3.69 KB |
04. Securing Your User Authentication Processes/01. Coming Up.mp4 | 1.20 MB |
04. Securing Your User Authentication Processes/01. Coming Up.srt | 1.06 KB |
04. Securing Your User Authentication Processes/02. The Authorization Code Flow.mp4 | 13.48 MB |
04. Securing Your User Authentication Processes/02. The Authorization Code Flow.srt | 12.53 KB |
04. Securing Your User Authentication Processes/03. Demo - Configuring IdentityServer to Log in with The Authorization Code Flow.mp4 | 5.83 MB |
04. Securing Your User Authentication Processes/03. Demo - Configuring IdentityServer to Log in with The Authorization Code Flow.srt | 3.44 KB |
04. Securing Your User Authentication Processes/04. Demo - Logging in with the Authorization Code Flow.mp4 | 49.37 MB |
04. Securing Your User Authentication Processes/04. Demo - Logging in with the Authorization Code Flow.srt | 24.71 KB |
04. Securing Your User Authentication Processes/05. Authorization Code Injection Attack.mp4 | 2.39 MB |
04. Securing Your User Authentication Processes/05. Authorization Code Injection Attack.srt | 2.23 KB |
04. Securing Your User Authentication Processes/06. The Authorization Code Flow with PKCE Protection.mp4 | 2.55 MB |
04. Securing Your User Authentication Processes/06. The Authorization Code Flow with PKCE Protection.srt | 2.47 KB |
04. Securing Your User Authentication Processes/07. Demo - Logging out of Our Web Application.mp4 | 10.52 MB |
04. Securing Your User Authentication Processes/07. Demo - Logging out of Our Web Application.srt | 5.80 KB |
04. Securing Your User Authentication Processes/08. Logging out of the Identity Provider.mp4 | 6.94 MB |
04. Securing Your User Authentication Processes/08. Logging out of the Identity Provider.srt | 3.09 KB |
04. Securing Your User Authentication Processes/09. Demo - Redirecting After Logging out.mp4 | 11.28 MB |
04. Securing Your User Authentication Processes/09. Demo - Redirecting After Logging out.srt | 4.84 KB |
04. Securing Your User Authentication Processes/10. The UserInfo Endpoint.mp4 | 5.47 MB |
04. Securing Your User Authentication Processes/10. The UserInfo Endpoint.srt | 5.76 KB |
04. Securing Your User Authentication Processes/11. Demo - Returning Additional Claims From the UserInfo Endpoint.mp4 | 6.44 MB |
04. Securing Your User Authentication Processes/11. Demo - Returning Additional Claims From the UserInfo Endpoint.srt | 2.48 KB |
04. Securing Your User Authentication Processes/12. Inspecting an Identity Token.mp4 | 4.59 MB |
04. Securing Your User Authentication Processes/12. Inspecting an Identity Token.srt | 4.39 KB |
04. Securing Your User Authentication Processes/13. Summary.mp4 | 2.77 MB |
04. Securing Your User Authentication Processes/13. Summary.srt | 2.39 KB |
05. Working with Claims in Your Web Application/01. Coming Up.mp4 | 1.23 MB |
05. Working with Claims in Your Web Application/01. Coming Up.srt | 1.11 KB |
05. Working with Claims in Your Web Application/02. Demo - Claims Transformation- Keeping the Original Claim Types.mp4 | 8.31 MB |
05. Working with Claims in Your Web Application/02. Demo - Claims Transformation- Keeping the Original Claim Types.srt | 3.70 KB |
05. Working with Claims in Your Web Application/03. Demo - Claims Transformation- Manipulating the Claims Collection.mp4 | 11.58 MB |
05. Working with Claims in Your Web Application/03. Demo - Claims Transformation- Manipulating the Claims Collection.srt | 5.63 KB |
05. Working with Claims in Your Web Application/04. Role-based Access Control.mp4 | 1.87 MB |
05. Working with Claims in Your Web Application/04. Role-based Access Control.srt | 2.07 KB |
05. Working with Claims in Your Web Application/05. Demo - Role-based Authorization- Ensuring the Role Is Included.mp4 | 16.01 MB |
05. Working with Claims in Your Web Application/05. Demo - Role-based Authorization- Ensuring the Role Is Included.srt | 7.33 KB |
05. Working with Claims in Your Web Application/06. Demo - Role-based Authorization- Using the Role in Your Views.mp4 | 7.24 MB |
05. Working with Claims in Your Web Application/06. Demo - Role-based Authorization- Using the Role in Your Views.srt | 3.35 KB |
05. Working with Claims in Your Web Application/07. Demo - Role-based Authorization- Using the Role in Your Controllers.mp4 | 5.08 MB |
05. Working with Claims in Your Web Application/07. Demo - Role-based Authorization- Using the Role in Your Controllers.srt | 3.06 KB |
05. Working with Claims in Your Web Application/08. Demo - Creating an Access Denied Page.mp4 | 7.32 MB |
05. Working with Claims in Your Web Application/08. Demo - Creating an Access Denied Page.srt | 3.82 KB |
05. Working with Claims in Your Web Application/09. Summary.mp4 | 1.23 MB |
05. Working with Claims in Your Web Application/09. Summary.srt | 1.05 KB |
06. Understanding Authorization with OAuth2 and OpenID Connect/01. Coming Up.mp4 | 923.60 KB |
06. Understanding Authorization with OAuth2 and OpenID Connect/01. Coming Up.srt | 857 B |
06. Understanding Authorization with OAuth2 and OpenID Connect/02. Learning How OAuth2 Works.mp4 | 3.01 MB |
06. Understanding Authorization with OAuth2 and OpenID Connect/02. Learning How OAuth2 Works.srt | 3.38 KB |
06. Understanding Authorization with OAuth2 and OpenID Connect/03. Using OpenID Connect for Authentication and Authorization.mp4 | 3.07 MB |
06. Understanding Authorization with OAuth2 and OpenID Connect/03. Using OpenID Connect for Authentication and Authorization.srt | 3.29 KB |
06. Understanding Authorization with OAuth2 and OpenID Connect/04. OAuth2 and OpenID Connect Flows.mp4 | 4.14 MB |
06. Understanding Authorization with OAuth2 and OpenID Connect/04. OAuth2 and OpenID Connect Flows.srt | 3.89 KB |
06. Understanding Authorization with OAuth2 and OpenID Connect/05. Inspecting an Access Token.mp4 | 3.18 MB |
06. Understanding Authorization with OAuth2 and OpenID Connect/05. Inspecting an Access Token.srt | 3.24 KB |
06. Understanding Authorization with OAuth2 and OpenID Connect/06. Summary.mp4 | 1.64 MB |
06. Understanding Authorization with OAuth2 and OpenID Connect/06. Summary.srt | 1.49 KB |
07. Securing Your API/01. Coming Up.mp4 | 1.99 MB |
07. Securing Your API/01. Coming Up.srt | 1.77 KB |
07. Securing Your API/02. The Authorization Code Flow with PKCE Protection.mp4 | 3.86 MB |
07. Securing Your API/02. The Authorization Code Flow with PKCE Protection.srt | 3.65 KB |
07. Securing Your API/03. Demo - Securing Access to Your API (Part 1).mp4 | 4.88 MB |
07. Securing Your API/03. Demo - Securing Access to Your API (Part 1).srt | 2.43 KB |
07. Securing Your API/04. API Scopes vs. API Resources.mp4 | 4.49 MB |
07. Securing Your API/04. API Scopes vs. API Resources.srt | 4.68 KB |
07. Securing Your API/05. Demo - Securing Access to Your API (Part 2).mp4 | 18.48 MB |
07. Securing Your API/05. Demo - Securing Access to Your API (Part 2).srt | 9.33 KB |
07. Securing Your API/06. Demo - Passing an Access Token to Your API.mp4 | 18.25 MB |
07. Securing Your API/06. Demo - Passing an Access Token to Your API.srt | 7.87 KB |
07. Securing Your API/07. Demo - Using Access Token Claims When Getting Resources.mp4 | 12.24 MB |
07. Securing Your API/07. Demo - Using Access Token Claims When Getting Resources.srt | 5.74 KB |
07. Securing Your API/08. Including Identity Claims in an Access Token.mp4 | 1.68 MB |
07. Securing Your API/08. Including Identity Claims in an Access Token.srt | 1.79 KB |
07. Securing Your API/09. Demo - Including Identity Claims in an Access Token.mp4 | 3.66 MB |
07. Securing Your API/09. Demo - Including Identity Claims in an Access Token.srt | 1.30 KB |
07. Securing Your API/10. Demo - Protecting the API When Creating a Resource (with Roles).mp4 | 12.09 MB |
07. Securing Your API/10. Demo - Protecting the API When Creating a Resource (with Roles).srt | 5.86 KB |
07. Securing Your API/11. Summary.mp4 | 2.37 MB |
07. Securing Your API/11. Summary.srt | 1.97 KB |
08. Authorization Policies and Access Control/01. Coming Up.mp4 | 1.69 MB |
08. Authorization Policies and Access Control/01. Coming Up.srt | 1.66 KB |
08. Authorization Policies and Access Control/02. Role-based Access Control vs. Attribute-based Access Control.mp4 | 4.28 MB |
08. Authorization Policies and Access Control/02. Role-based Access Control vs. Attribute-based Access Control.srt | 3.84 KB |
08. Authorization Policies and Access Control/03. Demo - Creating an Authorization Policy.mp4 | 19.16 MB |
08. Authorization Policies and Access Control/03. Demo - Creating an Authorization Policy.srt | 8.89 KB |
08. Authorization Policies and Access Control/04. Demo - Using an Authorization Policy (Web Client).mp4 | 8.79 MB |
08. Authorization Policies and Access Control/04. Demo - Using an Authorization Policy (Web Client).srt | 4.34 KB |
08. Authorization Policies and Access Control/05. Demo - Using an Authorization Policy (API).mp4 | 12.09 MB |
08. Authorization Policies and Access Control/05. Demo - Using an Authorization Policy (API).srt | 5.02 KB |
08. Authorization Policies and Access Control/06. Fine-grained Policies with Scopes.mp4 | 1.55 MB |
08. Authorization Policies and Access Control/06. Fine-grained Policies with Scopes.srt | 1.60 KB |
08. Authorization Policies and Access Control/07. Demo - Fine-grained Policies with Scopes.mp4 | 15.90 MB |
08. Authorization Policies and Access Control/07. Demo - Fine-grained Policies with Scopes.srt | 7.39 KB |
08. Authorization Policies and Access Control/08. Extending Authorization Policies with Requirements and Handlers.mp4 | 4.16 MB |
08. Authorization Policies and Access Control/08. Extending Authorization Policies with Requirements and Handlers.srt | 3.93 KB |
08. Authorization Policies and Access Control/09. Demo - Creating Custom Requirements and Handlers.mp4 | 22.88 MB |
08. Authorization Policies and Access Control/09. Demo - Creating Custom Requirements and Handlers.srt | 11.12 KB |
08. Authorization Policies and Access Control/10. Using Custom Attributes for Authorization.mp4 | 1.26 MB |
08. Authorization Policies and Access Control/10. Using Custom Attributes for Authorization.srt | 1.20 KB |
08. Authorization Policies and Access Control/11. Demo - Using Custom Attributes for Authorization.mp4 | 7.31 MB |
08. Authorization Policies and Access Control/11. Demo - Using Custom Attributes for Authorization.srt | 3.42 KB |
08. Authorization Policies and Access Control/12. Summary.mp4 | 1.93 MB |
08. Authorization Policies and Access Control/12. Summary.srt | 1.50 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/01. Coming Up.mp4 | 1.80 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/01. Coming Up.srt | 1.45 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/02. Token Lifetimes and Expiration.mp4 | 4.29 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/02. Token Lifetimes and Expiration.srt | 3.28 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/03. Demo - Token Lifetimes and Expiration.mp4 | 7.85 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/03. Demo - Token Lifetimes and Expiration.srt | 3.71 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/04. Gaining Long-Lived Access with Refresh Tokens.mp4 | 3.53 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/04. Gaining Long-Lived Access with Refresh Tokens.srt | 3.82 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/05. Demo - Gaining Long-lived Access.mp4 | 16.05 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/05. Demo - Gaining Long-lived Access.srt | 7.02 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/06. Working with Reference Tokens.mp4 | 2.70 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/06. Working with Reference Tokens.srt | 2.81 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/07. Demo - Working with Reference Tokens.mp4 | 13.58 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/07. Demo - Working with Reference Tokens.srt | 5.77 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/08. Token Revocation.mp4 | 1.47 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/08. Token Revocation.srt | 1.67 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/09. Demo - Revoking Tokens.mp4 | 15.58 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/09. Demo - Revoking Tokens.srt | 7.45 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/10. Generating Tokens for API Testing.mp4 | 5.59 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/10. Generating Tokens for API Testing.srt | 4.76 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/11. Demo - Generating a Token with dotnet user-jwts.mp4 | 26.25 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/11. Demo - Generating a Token with dotnet user-jwts.srt | 13.74 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/12. Token Validation.mp4 | 7.94 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/12. Token Validation.srt | 8.03 KB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/13. Summary.mp4 | 3.78 MB |
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/13. Summary.srt | 3.64 KB |
10. Best Practices for Securing JavaScript-based Clients/01. Coming Up.mp4 | 1.87 MB |
10. Best Practices for Securing JavaScript-based Clients/01. Coming Up.srt | 1.69 KB |
10. Best Practices for Securing JavaScript-based Clients/02. From Past to Current Best Practice.mp4 | 12.52 MB |
10. Best Practices for Securing JavaScript-based Clients/02. From Past to Current Best Practice.srt | 12.05 KB |
10. Best Practices for Securing JavaScript-based Clients/03. Detailing the Backend-for-Frontend Pattern.mp4 | 8.42 MB |
10. Best Practices for Securing JavaScript-based Clients/03. Detailing the Backend-for-Frontend Pattern.srt | 8.88 KB |
10. Best Practices for Securing JavaScript-based Clients/04. Demo - Logging In.mp4 | 11.31 MB |
10. Best Practices for Securing JavaScript-based Clients/04. Demo - Logging In.srt | 7.07 KB |
10. Best Practices for Securing JavaScript-based Clients/05. Demo - Getting Acces to User Information.mp4 | 7.93 MB |
10. Best Practices for Securing JavaScript-based Clients/05. Demo - Getting Acces to User Information.srt | 4.26 KB |
10. Best Practices for Securing JavaScript-based Clients/06. Demo - Logging Out.mp4 | 7.79 MB |
10. Best Practices for Securing JavaScript-based Clients/06. Demo - Logging Out.srt | 4.03 KB |
10. Best Practices for Securing JavaScript-based Clients/07. Demo - Calling the Remote API.mp4 | 11.61 MB |
10. Best Practices for Securing JavaScript-based Clients/07. Demo - Calling the Remote API.srt | 6.21 KB |
10. Best Practices for Securing JavaScript-based Clients/08. Summary.mp4 | 1.90 MB |
10. Best Practices for Securing JavaScript-based Clients/08. Summary.srt | 1.61 KB |
11. Storing Users and Credentials in a Local Database/01. Coming Up.mp4 | 1.35 MB |
11. Storing Users and Credentials in a Local Database/01. Coming Up.srt | 1.18 KB |
11. Storing Users and Credentials in a Local Database/02. How Credentials Fit in OpenID Connect.mp4 | 2.91 MB |
11. Storing Users and Credentials in a Local Database/02. How Credentials Fit in OpenID Connect.srt | 2.24 KB |
11. Storing Users and Credentials in a Local Database/03. Means of Authentication and Approaches.mp4 | 6.35 MB |
11. Storing Users and Credentials in a Local Database/03. Means of Authentication and Approaches.srt | 6.41 KB |
11. Storing Users and Credentials in a Local Database/04. Implementation Approaches- Custom, ASP.NET Core Identity and the Microsoft Identity Framework.mp4 | 10.72 MB |
11. Storing Users and Credentials in a Local Database/04. Implementation Approaches- Custom, ASP.NET Core Identity and the Microsoft Identity Framework.srt | 8.08 KB |
11. Storing Users and Credentials in a Local Database/05. Inspecting the User Database Schema.mp4 | 2.94 MB |
11. Storing Users and Credentials in a Local Database/05. Inspecting the User Database Schema.srt | 3.14 KB |
11. Storing Users and Credentials in a Local Database/06. Demo - Creating a User Database.mp4 | 15.22 MB |
11. Storing Users and Credentials in a Local Database/06. Demo - Creating a User Database.srt | 7.25 KB |
11. Storing Users and Credentials in a Local Database/07. Interacting with IdentityServer.mp4 | 3.27 MB |
11. Storing Users and Credentials in a Local Database/07. Interacting with IdentityServer.srt | 3.01 KB |
11. Storing Users and Credentials in a Local Database/08. Demo - Inspecting UI Interaction with IdentityServer.mp4 | 18.06 MB |
11. Storing Users and Credentials in a Local Database/08. Demo - Inspecting UI Interaction with IdentityServer.srt | 9.79 KB |
11. Storing Users and Credentials in a Local Database/09. Demo - Inspecting the User Service.mp4 | 3.93 MB |
11. Storing Users and Credentials in a Local Database/09. Demo - Inspecting the User Service.srt | 2.20 KB |
11. Storing Users and Credentials in a Local Database/10. Demo - Integrating IdentityServer with a Custom User Database.mp4 | 11.18 MB |
11. Storing Users and Credentials in a Local Database/10. Demo - Integrating IdentityServer with a Custom User Database.srt | 4.65 KB |
11. Storing Users and Credentials in a Local Database/11. Building Your Identity with a Profile Service.mp4 | 2.44 MB |
11. Storing Users and Credentials in a Local Database/11. Building Your Identity with a Profile Service.srt | 2.29 KB |
11. Storing Users and Credentials in a Local Database/12. Demo - Building Your Identity with a Profile Service.mp4 | 9.91 MB |
11. Storing Users and Credentials in a Local Database/12. Demo - Building Your Identity with a Profile Service.srt | 4.69 KB |
11. Storing Users and Credentials in a Local Database/13. Summary.mp4 | 3.39 MB |
11. Storing Users and Credentials in a Local Database/13. Summary.srt | 3.05 KB |
12. Best Practices for User Management/01. Coming Up.mp4 | 1.37 MB |
12. Best Practices for User Management/01. Coming Up.srt | 1.14 KB |
12. Best Practices for User Management/02. Where Should User Management Screens Live-.mp4 | 3.59 MB |
12. Best Practices for User Management/02. Where Should User Management Screens Live-.srt | 3.35 KB |
12. Best Practices for User Management/03. Demo - Implementing a User Registration Screen.mp4 | 34.01 MB |
12. Best Practices for User Management/03. Demo - Implementing a User Registration Screen.srt | 17.08 KB |
12. Best Practices for User Management/04. Safely Storing Passwords.mp4 | 11.52 MB |
12. Best Practices for User Management/04. Safely Storing Passwords.srt | 11.26 KB |
12. Best Practices for User Management/05. Demo - Safely Storing Passwords.mp4 | 13.44 MB |
12. Best Practices for User Management/05. Demo - Safely Storing Passwords.srt | 6.55 KB |
12. Best Practices for User Management/06. Activating an Account.mp4 | 2.57 MB |
12. Best Practices for User Management/06. Activating an Account.srt | 2.57 KB |
12. Best Practices for User Management/07. Demo - Activating an Account.mp4 | 30.61 MB |
12. Best Practices for User Management/07. Demo - Activating an Account.srt | 15.48 KB |
12. Best Practices for User Management/08. Additional User Management Related Best Practices.mp4 | 5.51 MB |
12. Best Practices for User Management/08. Additional User Management Related Best Practices.srt | 5.03 KB |
12. Best Practices for User Management/09. Password Policy Best Practices.mp4 | 2.65 MB |
12. Best Practices for User Management/09. Password Policy Best Practices.srt | 2.52 KB |
12. Best Practices for User Management/10. Summary.mp4 | 2.14 MB |
12. Best Practices for User Management/10. Summary.srt | 2.04 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/01. Coming Up.mp4 | 1.89 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/01. Coming Up.srt | 1.71 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/02. Handling Integration with Third-party Providers.mp4 | 5.46 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/02. Handling Integration with Third-party Providers.srt | 5.50 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/03. Use Cases for Windows Authentication.mp4 | 1.77 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/03. Use Cases for Windows Authentication.srt | 1.67 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/04. Windows Authentication Beneath the Covers.mp4 | 4.12 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/04. Windows Authentication Beneath the Covers.srt | 3.88 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/05. Demo - Enabling Windows Authentication on IIS Express.mp4 | 9.93 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/05. Demo - Enabling Windows Authentication on IIS Express.srt | 5.07 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/06. Demo - Integrating Windows Authentication with IdentityServer.mp4 | 25.08 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/06. Demo - Integrating Windows Authentication with IdentityServer.srt | 13.83 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/07. Federation with Third-party Identity Providers.mp4 | 5.13 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/07. Federation with Third-party Identity Providers.srt | 5.24 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/08. Demo - Inspecting Support for Federating with a Third-party Identity Provider.mp4 | 17.52 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/08. Demo - Inspecting Support for Federating with a Third-party Identity Provider.srt | 8.75 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/09. Integrating with Microsoft Entra ID (Azure Active Directory).mp4 | 3.13 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/09. Integrating with Microsoft Entra ID (Azure Active Directory).srt | 1.59 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/10. Demo - Registering an Application on Azure AD.mp4 | 12.53 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/10. Demo - Registering an Application on Azure AD.srt | 7.47 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/11. Demo - Integrating with Azure AD.mp4 | 16.58 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/11. Demo - Integrating with Azure AD.srt | 8.29 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/12. Demo - Registering an Application on Facebook.mp4 | 7.22 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/12. Demo - Registering an Application on Facebook.srt | 5.08 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/13. Demo - Integrating with Facebook.mp4 | 11.91 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/13. Demo - Integrating with Facebook.srt | 5.70 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/14. Challenges When Integrating with Third-party Identity Providers.mp4 | 4.28 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/14. Challenges When Integrating with Third-party Identity Providers.srt | 4.34 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/15. Integrating with Other Third-party Identity Providers.mp4 | 2.94 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/15. Integrating with Other Third-party Identity Providers.srt | 1.97 KB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/16. Summary.mp4 | 4.13 MB |
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/16. Summary.srt | 3.62 KB |
14. User Provisioning, Federation, and Federated Identity/01. Coming Up.mp4 | 1.30 MB |
14. User Provisioning, Federation, and Federated Identity/01. Coming Up.srt | 1.13 KB |
14. User Provisioning, Federation, and Federated Identity/02. Integrating Local Users with External Users.mp4 | 2.15 MB |
14. User Provisioning, Federation, and Federated Identity/02. Integrating Local Users with External Users.srt | 2.16 KB |
14. User Provisioning, Federation, and Federated Identity/03. Federated Authentication and Federated Identity.mp4 | 5.17 MB |
14. User Provisioning, Federation, and Federated Identity/03. Federated Authentication and Federated Identity.srt | 4.88 KB |
14. User Provisioning, Federation, and Federated Identity/04. Demo - Enhancing the Database Schema for Federated Identity.mp4 | 8.10 MB |
14. User Provisioning, Federation, and Federated Identity/04. Demo - Enhancing the Database Schema for Federated Identity.srt | 4.10 KB |
14. User Provisioning, Federation, and Federated Identity/05. Demo - Provisioning a New User with a Federated Identity (Part 1).mp4 | 19.17 MB |
14. User Provisioning, Federation, and Federated Identity/05. Demo - Provisioning a New User with a Federated Identity (Part 1).srt | 8.06 KB |
14. User Provisioning, Federation, and Federated Identity/06. Transforming Claims.mp4 | 1.32 MB |
14. User Provisioning, Federation, and Federated Identity/06. Transforming Claims.srt | 1.22 KB |
14. User Provisioning, Federation, and Federated Identity/07. Demo - Provisioning a New User with a Federated Identity (Part 2).mp4 | 9.90 MB |
14. User Provisioning, Federation, and Federated Identity/07. Demo - Provisioning a New User with a Federated Identity (Part 2).srt | 4.25 KB |
14. User Provisioning, Federation, and Federated Identity/08. Provisioning a New User with a Federated Identity – Flow Variations.mp4 | 2.89 MB |
14. User Provisioning, Federation, and Federated Identity/08. Provisioning a New User with a Federated Identity – Flow Variations.srt | 2.73 KB |
14. User Provisioning, Federation, and Federated Identity/09. Demo - Linking a Provider to an Existing User.mp4 | 19.44 MB |
14. User Provisioning, Federation, and Federated Identity/09. Demo - Linking a Provider to an Existing User.srt | 8.45 KB |
14. User Provisioning, Federation, and Federated Identity/10. Additional Federated Identity Use Cases.mp4 | 2.13 MB |
14. User Provisioning, Federation, and Federated Identity/10. Additional Federated Identity Use Cases.srt | 2.06 KB |
14. User Provisioning, Federation, and Federated Identity/11. Summary.mp4 | 2.73 MB |
14. User Provisioning, Federation, and Federated Identity/11. Summary.srt | 2.37 KB |
15. Supporting Multi-factor Authentication/01. Coming Up.mp4 | 984.41 KB |
15. Supporting Multi-factor Authentication/01. Coming Up.srt | 895 B |
15. Supporting Multi-factor Authentication/02. Introducing Multi-factor Authentication.mp4 | 3.52 MB |
15. Supporting Multi-factor Authentication/02. Introducing Multi-factor Authentication.srt | 3.43 KB |
15. Supporting Multi-factor Authentication/03. Supporting MFA with a One-Time Password Through Email.mp4 | 3.13 MB |
15. Supporting Multi-factor Authentication/03. Supporting MFA with a One-Time Password Through Email.srt | 2.86 KB |
15. Supporting Multi-factor Authentication/04. Supporting MFA with an Authenticator Application.mp4 | 7.32 MB |
15. Supporting Multi-factor Authentication/04. Supporting MFA with an Authenticator Application.srt | 6.90 KB |
15. Supporting Multi-factor Authentication/05. Demo - Supporting MFA with an Authenticator Application (Enhancing the Database Schema).mp4 | 3.97 MB |
15. Supporting Multi-factor Authentication/05. Demo - Supporting MFA with an Authenticator Application (Enhancing the Database Schema).srt | 1.81 KB |
15. Supporting Multi-factor Authentication/06. Supporting MFA with an Authenticator Application (Registration).mp4 | 31.17 MB |
15. Supporting Multi-factor Authentication/06. Supporting MFA with an Authenticator Application (Registration).srt | 16.35 KB |
15. Supporting Multi-factor Authentication/07. Supporting MFA with an Authenticator Application - Authentication.mp4 | 3.52 MB |
15. Supporting Multi-factor Authentication/07. Supporting MFA with an Authenticator Application - Authentication.srt | 3.59 KB |
15. Supporting Multi-factor Authentication/08. Demo - Supporting MFA with an Authenticator Application (Authentication).mp4 | 11.53 MB |
15. Supporting Multi-factor Authentication/08. Demo - Supporting MFA with an Authenticator Application (Authentication).srt | 5.48 KB |
15. Supporting Multi-factor Authentication/09. Summary.mp4 | 2.23 MB |
15. Supporting Multi-factor Authentication/09. Summary.srt | 1.88 KB |
16. Integrating with ASP.NET Core Identity/01. Coming Up.mp4 | 457.05 KB |
16. Integrating with ASP.NET Core Identity/01. Coming Up.srt | 386 B |
16. Integrating with ASP.NET Core Identity/02. Integrating with ASP.NET Core Identity.mp4 | 2.23 MB |
16. Integrating with ASP.NET Core Identity/02. Integrating with ASP.NET Core Identity.srt | 2.19 KB |
16. Integrating with ASP.NET Core Identity/03. Demo - Adding ASP.NET Core Identity to the IDP Project.mp4 | 27.93 MB |
16. Integrating with ASP.NET Core Identity/03. Demo - Adding ASP.NET Core Identity to the IDP Project.srt | 13.18 KB |
16. Integrating with ASP.NET Core Identity/04. Linking IdentityServer to ASP.NET Core Identity.mp4 | 13.11 MB |
16. Integrating with ASP.NET Core Identity/04. Linking IdentityServer to ASP.NET Core Identity.srt | 6.33 KB |
16. Integrating with ASP.NET Core Identity/05. Summary.mp4 | 747.58 KB |
16. Integrating with ASP.NET Core Identity/05. Summary.srt | 681 B |
17. Getting Ready for Production and Deploying Your Identity Provider/01. Coming Up.mp4 | 1.33 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/01. Coming Up.srt | 1.11 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/02. Deploying IdentityServer to Azure.mp4 | 9.74 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/02. Deploying IdentityServer to Azure.srt | 10.91 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/03. Demo - Persisting Configuration Data.mp4 | 24.92 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/03. Demo - Persisting Configuration Data.srt | 12.90 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/04. Demo - Persisting Operational Data.mp4 | 7.08 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/04. Demo - Persisting Operational Data.srt | 3.67 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/05. Demo - Moving From SQLite to SQL Azure.mp4 | 14.17 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/05. Demo - Moving From SQLite to SQL Azure.srt | 7.16 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/06. Demo - Configuring Data Protection.mp4 | 22.88 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/06. Demo - Configuring Data Protection.srt | 12.95 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/07. Demo - Storing Key Material in Azure KeyVault.mp4 | 19.60 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/07. Demo - Storing Key Material in Azure KeyVault.srt | 9.10 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/08. Demo - Configuring and Using the Forwarded Headers Middleware.mp4 | 6.78 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/08. Demo - Configuring and Using the Forwarded Headers Middleware.srt | 3.71 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/09. Demo - Applying a License.mp4 | 3.51 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/09. Demo - Applying a License.srt | 1.71 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/10. Demo - The Final Deployment.mp4 | 15.36 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/10. Demo - The Final Deployment.srt | 9.15 KB |
17. Getting Ready for Production and Deploying Your Identity Provider/11. Summary.mp4 | 4.10 MB |
17. Getting Ready for Production and Deploying Your Identity Provider/11. Summary.srt | 3.75 KB |
asp-dot-net-core-6-securing-oauth-2-openid-connect.zip | 256.28 MB |
No trackers found |
TorrentBank
Copyright © 2024