Securing ASP.NET Core with OAuth2 and OpenID Connect - TorrentBank

File Name:Securing ASP.NET Core with OAuth2 and OpenID Connect

Create Tool:

Create Time:2024-11-27 19:42:31

File Size:1602.11 MB

File Count:335

File Hash:13b7e481171dee26a45b08cfd49d0b61e659acb3

Magnet Link:

Magnet Link:

Torrent File:

01. Course Overview/01. Course Overview.mp4 3.36 MB
01. Course Overview/01. Course Overview.srt 2.18 KB
02. Getting Started with ASP.NET Core Security/01. Coming Up.mp4 6.36 MB
02. Getting Started with ASP.NET Core Security/01. Coming Up.srt 4.88 KB
02. Getting Started with ASP.NET Core Security/02. Positioning This Course.mp4 2.42 MB
02. Getting Started with ASP.NET Core Security/02. Positioning This Course.srt 2.51 KB
02. Getting Started with ASP.NET Core Security/03. Course Prerequisites.mp4 1003.18 KB
02. Getting Started with ASP.NET Core Security/03. Course Prerequisites.srt 1.20 KB
02. Getting Started with ASP.NET Core Security/04. Frameworks and Tooling.mp4 4.88 MB
02. Getting Started with ASP.NET Core Security/04. Frameworks and Tooling.srt 3.58 KB
02. Getting Started with ASP.NET Core Security/05. Application Architectures and Security.mp4 12.70 MB
02. Getting Started with ASP.NET Core Security/05. Application Architectures and Security.srt 12.71 KB
02. Getting Started with ASP.NET Core Security/06. Working Towards a Central Identity Provider.mp4 8.25 MB
02. Getting Started with ASP.NET Core Security/06. Working Towards a Central Identity Provider.srt 7.43 KB
02. Getting Started with ASP.NET Core Security/07. Introducing OAuth2.mp4 3.76 MB
02. Getting Started with ASP.NET Core Security/07. Introducing OAuth2.srt 3.61 KB
02. Getting Started with ASP.NET Core Security/08. Introducing OpenID Connect.mp4 2.65 MB
02. Getting Started with ASP.NET Core Security/08. Introducing OpenID Connect.srt 2.74 KB
02. Getting Started with ASP.NET Core Security/09. Demo - Introducing the Demo Application.mp4 10.52 MB
02. Getting Started with ASP.NET Core Security/09. Demo - Introducing the Demo Application.srt 7.14 KB
02. Getting Started with ASP.NET Core Security/10. Summary.mp4 1.38 MB
02. Getting Started with ASP.NET Core Security/10. Summary.srt 1.25 KB
03. Understanding Authentication with OpenID Connect/01. Coming Up.mp4 1.10 MB
03. Understanding Authentication with OpenID Connect/01. Coming Up.srt 876 B
03. Understanding Authentication with OpenID Connect/02. Learning How OpenID Connect Works.mp4 3.69 MB
03. Understanding Authentication with OpenID Connect/02. Learning How OpenID Connect Works.srt 4.28 KB
03. Understanding Authentication with OpenID Connect/03. Confidential and Public Clients.mp4 3.93 MB
03. Understanding Authentication with OpenID Connect/03. Confidential and Public Clients.srt 3.39 KB
03. Understanding Authentication with OpenID Connect/04. OpenID Connect Flows and Endpoints.mp4 18.00 MB
03. Understanding Authentication with OpenID Connect/04. OpenID Connect Flows and Endpoints.srt 15.88 KB
03. Understanding Authentication with OpenID Connect/05. Introducing Duende IdentityServer.mp4 9.30 MB
03. Understanding Authentication with OpenID Connect/05. Introducing Duende IdentityServer.srt 4.36 KB
03. Understanding Authentication with OpenID Connect/06. Demo - Setting Up IdentityServer.mp4 23.39 MB
03. Understanding Authentication with OpenID Connect/06. Demo - Setting Up IdentityServer.srt 14.17 KB
03. Understanding Authentication with OpenID Connect/07. Demo - Adding a User Interface.mp4 8.70 MB
03. Understanding Authentication with OpenID Connect/07. Demo - Adding a User Interface.srt 4.48 KB
03. Understanding Authentication with OpenID Connect/08. Demo - Adding Users to Test With.mp4 9.95 MB
03. Understanding Authentication with OpenID Connect/08. Demo - Adding Users to Test With.srt 6.02 KB
03. Understanding Authentication with OpenID Connect/09. Summary.mp4 4.07 MB
03. Understanding Authentication with OpenID Connect/09. Summary.srt 3.69 KB
04. Securing Your User Authentication Processes/01. Coming Up.mp4 1.20 MB
04. Securing Your User Authentication Processes/01. Coming Up.srt 1.06 KB
04. Securing Your User Authentication Processes/02. The Authorization Code Flow.mp4 13.48 MB
04. Securing Your User Authentication Processes/02. The Authorization Code Flow.srt 12.53 KB
04. Securing Your User Authentication Processes/03. Demo - Configuring IdentityServer to Log in with The Authorization Code Flow.mp4 5.83 MB
04. Securing Your User Authentication Processes/03. Demo - Configuring IdentityServer to Log in with The Authorization Code Flow.srt 3.44 KB
04. Securing Your User Authentication Processes/04. Demo - Logging in with the Authorization Code Flow.mp4 49.37 MB
04. Securing Your User Authentication Processes/04. Demo - Logging in with the Authorization Code Flow.srt 24.71 KB
04. Securing Your User Authentication Processes/05. Authorization Code Injection Attack.mp4 2.39 MB
04. Securing Your User Authentication Processes/05. Authorization Code Injection Attack.srt 2.23 KB
04. Securing Your User Authentication Processes/06. The Authorization Code Flow with PKCE Protection.mp4 2.55 MB
04. Securing Your User Authentication Processes/06. The Authorization Code Flow with PKCE Protection.srt 2.47 KB
04. Securing Your User Authentication Processes/07. Demo - Logging out of Our Web Application.mp4 10.52 MB
04. Securing Your User Authentication Processes/07. Demo - Logging out of Our Web Application.srt 5.80 KB
04. Securing Your User Authentication Processes/08. Logging out of the Identity Provider.mp4 6.94 MB
04. Securing Your User Authentication Processes/08. Logging out of the Identity Provider.srt 3.09 KB
04. Securing Your User Authentication Processes/09. Demo - Redirecting After Logging out.mp4 11.28 MB
04. Securing Your User Authentication Processes/09. Demo - Redirecting After Logging out.srt 4.84 KB
04. Securing Your User Authentication Processes/10. The UserInfo Endpoint.mp4 5.47 MB
04. Securing Your User Authentication Processes/10. The UserInfo Endpoint.srt 5.76 KB
04. Securing Your User Authentication Processes/11. Demo - Returning Additional Claims From the UserInfo Endpoint.mp4 6.44 MB
04. Securing Your User Authentication Processes/11. Demo - Returning Additional Claims From the UserInfo Endpoint.srt 2.48 KB
04. Securing Your User Authentication Processes/12. Inspecting an Identity Token.mp4 4.59 MB
04. Securing Your User Authentication Processes/12. Inspecting an Identity Token.srt 4.39 KB
04. Securing Your User Authentication Processes/13. Summary.mp4 2.77 MB
04. Securing Your User Authentication Processes/13. Summary.srt 2.39 KB
05. Working with Claims in Your Web Application/01. Coming Up.mp4 1.23 MB
05. Working with Claims in Your Web Application/01. Coming Up.srt 1.11 KB
05. Working with Claims in Your Web Application/02. Demo - Claims Transformation- Keeping the Original Claim Types.mp4 8.31 MB
05. Working with Claims in Your Web Application/02. Demo - Claims Transformation- Keeping the Original Claim Types.srt 3.70 KB
05. Working with Claims in Your Web Application/03. Demo - Claims Transformation- Manipulating the Claims Collection.mp4 11.58 MB
05. Working with Claims in Your Web Application/03. Demo - Claims Transformation- Manipulating the Claims Collection.srt 5.63 KB
05. Working with Claims in Your Web Application/04. Role-based Access Control.mp4 1.87 MB
05. Working with Claims in Your Web Application/04. Role-based Access Control.srt 2.07 KB
05. Working with Claims in Your Web Application/05. Demo - Role-based Authorization- Ensuring the Role Is Included.mp4 16.01 MB
05. Working with Claims in Your Web Application/05. Demo - Role-based Authorization- Ensuring the Role Is Included.srt 7.33 KB
05. Working with Claims in Your Web Application/06. Demo - Role-based Authorization- Using the Role in Your Views.mp4 7.24 MB
05. Working with Claims in Your Web Application/06. Demo - Role-based Authorization- Using the Role in Your Views.srt 3.35 KB
05. Working with Claims in Your Web Application/07. Demo - Role-based Authorization- Using the Role in Your Controllers.mp4 5.08 MB
05. Working with Claims in Your Web Application/07. Demo - Role-based Authorization- Using the Role in Your Controllers.srt 3.06 KB
05. Working with Claims in Your Web Application/08. Demo - Creating an Access Denied Page.mp4 7.32 MB
05. Working with Claims in Your Web Application/08. Demo - Creating an Access Denied Page.srt 3.82 KB
05. Working with Claims in Your Web Application/09. Summary.mp4 1.23 MB
05. Working with Claims in Your Web Application/09. Summary.srt 1.05 KB
06. Understanding Authorization with OAuth2 and OpenID Connect/01. Coming Up.mp4 923.60 KB
06. Understanding Authorization with OAuth2 and OpenID Connect/01. Coming Up.srt 857 B
06. Understanding Authorization with OAuth2 and OpenID Connect/02. Learning How OAuth2 Works.mp4 3.01 MB
06. Understanding Authorization with OAuth2 and OpenID Connect/02. Learning How OAuth2 Works.srt 3.38 KB
06. Understanding Authorization with OAuth2 and OpenID Connect/03. Using OpenID Connect for Authentication and Authorization.mp4 3.07 MB
06. Understanding Authorization with OAuth2 and OpenID Connect/03. Using OpenID Connect for Authentication and Authorization.srt 3.29 KB
06. Understanding Authorization with OAuth2 and OpenID Connect/04. OAuth2 and OpenID Connect Flows.mp4 4.14 MB
06. Understanding Authorization with OAuth2 and OpenID Connect/04. OAuth2 and OpenID Connect Flows.srt 3.89 KB
06. Understanding Authorization with OAuth2 and OpenID Connect/05. Inspecting an Access Token.mp4 3.18 MB
06. Understanding Authorization with OAuth2 and OpenID Connect/05. Inspecting an Access Token.srt 3.24 KB
06. Understanding Authorization with OAuth2 and OpenID Connect/06. Summary.mp4 1.64 MB
06. Understanding Authorization with OAuth2 and OpenID Connect/06. Summary.srt 1.49 KB
07. Securing Your API/01. Coming Up.mp4 1.99 MB
07. Securing Your API/01. Coming Up.srt 1.77 KB
07. Securing Your API/02. The Authorization Code Flow with PKCE Protection.mp4 3.86 MB
07. Securing Your API/02. The Authorization Code Flow with PKCE Protection.srt 3.65 KB
07. Securing Your API/03. Demo - Securing Access to Your API (Part 1).mp4 4.88 MB
07. Securing Your API/03. Demo - Securing Access to Your API (Part 1).srt 2.43 KB
07. Securing Your API/04. API Scopes vs. API Resources.mp4 4.49 MB
07. Securing Your API/04. API Scopes vs. API Resources.srt 4.68 KB
07. Securing Your API/05. Demo - Securing Access to Your API (Part 2).mp4 18.48 MB
07. Securing Your API/05. Demo - Securing Access to Your API (Part 2).srt 9.33 KB
07. Securing Your API/06. Demo - Passing an Access Token to Your API.mp4 18.25 MB
07. Securing Your API/06. Demo - Passing an Access Token to Your API.srt 7.87 KB
07. Securing Your API/07. Demo - Using Access Token Claims When Getting Resources.mp4 12.24 MB
07. Securing Your API/07. Demo - Using Access Token Claims When Getting Resources.srt 5.74 KB
07. Securing Your API/08. Including Identity Claims in an Access Token.mp4 1.68 MB
07. Securing Your API/08. Including Identity Claims in an Access Token.srt 1.79 KB
07. Securing Your API/09. Demo - Including Identity Claims in an Access Token.mp4 3.66 MB
07. Securing Your API/09. Demo - Including Identity Claims in an Access Token.srt 1.30 KB
07. Securing Your API/10. Demo - Protecting the API When Creating a Resource (with Roles).mp4 12.09 MB
07. Securing Your API/10. Demo - Protecting the API When Creating a Resource (with Roles).srt 5.86 KB
07. Securing Your API/11. Summary.mp4 2.37 MB
07. Securing Your API/11. Summary.srt 1.97 KB
08. Authorization Policies and Access Control/01. Coming Up.mp4 1.69 MB
08. Authorization Policies and Access Control/01. Coming Up.srt 1.66 KB
08. Authorization Policies and Access Control/02. Role-based Access Control vs. Attribute-based Access Control.mp4 4.28 MB
08. Authorization Policies and Access Control/02. Role-based Access Control vs. Attribute-based Access Control.srt 3.84 KB
08. Authorization Policies and Access Control/03. Demo - Creating an Authorization Policy.mp4 19.16 MB
08. Authorization Policies and Access Control/03. Demo - Creating an Authorization Policy.srt 8.89 KB
08. Authorization Policies and Access Control/04. Demo - Using an Authorization Policy (Web Client).mp4 8.79 MB
08. Authorization Policies and Access Control/04. Demo - Using an Authorization Policy (Web Client).srt 4.34 KB
08. Authorization Policies and Access Control/05. Demo - Using an Authorization Policy (API).mp4 12.09 MB
08. Authorization Policies and Access Control/05. Demo - Using an Authorization Policy (API).srt 5.02 KB
08. Authorization Policies and Access Control/06. Fine-grained Policies with Scopes.mp4 1.55 MB
08. Authorization Policies and Access Control/06. Fine-grained Policies with Scopes.srt 1.60 KB
08. Authorization Policies and Access Control/07. Demo - Fine-grained Policies with Scopes.mp4 15.90 MB
08. Authorization Policies and Access Control/07. Demo - Fine-grained Policies with Scopes.srt 7.39 KB
08. Authorization Policies and Access Control/08. Extending Authorization Policies with Requirements and Handlers.mp4 4.16 MB
08. Authorization Policies and Access Control/08. Extending Authorization Policies with Requirements and Handlers.srt 3.93 KB
08. Authorization Policies and Access Control/09. Demo - Creating Custom Requirements and Handlers.mp4 22.88 MB
08. Authorization Policies and Access Control/09. Demo - Creating Custom Requirements and Handlers.srt 11.12 KB
08. Authorization Policies and Access Control/10. Using Custom Attributes for Authorization.mp4 1.26 MB
08. Authorization Policies and Access Control/10. Using Custom Attributes for Authorization.srt 1.20 KB
08. Authorization Policies and Access Control/11. Demo - Using Custom Attributes for Authorization.mp4 7.31 MB
08. Authorization Policies and Access Control/11. Demo - Using Custom Attributes for Authorization.srt 3.42 KB
08. Authorization Policies and Access Control/12. Summary.mp4 1.93 MB
08. Authorization Policies and Access Control/12. Summary.srt 1.50 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/01. Coming Up.mp4 1.80 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/01. Coming Up.srt 1.45 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/02. Token Lifetimes and Expiration.mp4 4.29 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/02. Token Lifetimes and Expiration.srt 3.28 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/03. Demo - Token Lifetimes and Expiration.mp4 7.85 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/03. Demo - Token Lifetimes and Expiration.srt 3.71 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/04. Gaining Long-Lived Access with Refresh Tokens.mp4 3.53 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/04. Gaining Long-Lived Access with Refresh Tokens.srt 3.82 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/05. Demo - Gaining Long-lived Access.mp4 16.05 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/05. Demo - Gaining Long-lived Access.srt 7.02 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/06. Working with Reference Tokens.mp4 2.70 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/06. Working with Reference Tokens.srt 2.81 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/07. Demo - Working with Reference Tokens.mp4 13.58 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/07. Demo - Working with Reference Tokens.srt 5.77 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/08. Token Revocation.mp4 1.47 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/08. Token Revocation.srt 1.67 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/09. Demo - Revoking Tokens.mp4 15.58 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/09. Demo - Revoking Tokens.srt 7.45 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/10. Generating Tokens for API Testing.mp4 5.59 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/10. Generating Tokens for API Testing.srt 4.76 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/11. Demo - Generating a Token with dotnet user-jwts.mp4 26.25 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/11. Demo - Generating a Token with dotnet user-jwts.srt 13.74 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/12. Token Validation.mp4 7.94 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/12. Token Validation.srt 8.03 KB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/13. Summary.mp4 3.78 MB
09. Dealing with Token Expiration, Reference Tokens, Token Revocation, and Generating Tokens for Testing/13. Summary.srt 3.64 KB
10. Best Practices for Securing JavaScript-based Clients/01. Coming Up.mp4 1.87 MB
10. Best Practices for Securing JavaScript-based Clients/01. Coming Up.srt 1.69 KB
10. Best Practices for Securing JavaScript-based Clients/02. From Past to Current Best Practice.mp4 12.52 MB
10. Best Practices for Securing JavaScript-based Clients/02. From Past to Current Best Practice.srt 12.05 KB
10. Best Practices for Securing JavaScript-based Clients/03. Detailing the Backend-for-Frontend Pattern.mp4 8.42 MB
10. Best Practices for Securing JavaScript-based Clients/03. Detailing the Backend-for-Frontend Pattern.srt 8.88 KB
10. Best Practices for Securing JavaScript-based Clients/04. Demo - Logging In.mp4 11.31 MB
10. Best Practices for Securing JavaScript-based Clients/04. Demo - Logging In.srt 7.07 KB
10. Best Practices for Securing JavaScript-based Clients/05. Demo - Getting Acces to User Information.mp4 7.93 MB
10. Best Practices for Securing JavaScript-based Clients/05. Demo - Getting Acces to User Information.srt 4.26 KB
10. Best Practices for Securing JavaScript-based Clients/06. Demo - Logging Out.mp4 7.79 MB
10. Best Practices for Securing JavaScript-based Clients/06. Demo - Logging Out.srt 4.03 KB
10. Best Practices for Securing JavaScript-based Clients/07. Demo - Calling the Remote API.mp4 11.61 MB
10. Best Practices for Securing JavaScript-based Clients/07. Demo - Calling the Remote API.srt 6.21 KB
10. Best Practices for Securing JavaScript-based Clients/08. Summary.mp4 1.90 MB
10. Best Practices for Securing JavaScript-based Clients/08. Summary.srt 1.61 KB
11. Storing Users and Credentials in a Local Database/01. Coming Up.mp4 1.35 MB
11. Storing Users and Credentials in a Local Database/01. Coming Up.srt 1.18 KB
11. Storing Users and Credentials in a Local Database/02. How Credentials Fit in OpenID Connect.mp4 2.91 MB
11. Storing Users and Credentials in a Local Database/02. How Credentials Fit in OpenID Connect.srt 2.24 KB
11. Storing Users and Credentials in a Local Database/03. Means of Authentication and Approaches.mp4 6.35 MB
11. Storing Users and Credentials in a Local Database/03. Means of Authentication and Approaches.srt 6.41 KB
11. Storing Users and Credentials in a Local Database/04. Implementation Approaches- Custom, ASP.NET Core Identity and the Microsoft Identity Framework.mp4 10.72 MB
11. Storing Users and Credentials in a Local Database/04. Implementation Approaches- Custom, ASP.NET Core Identity and the Microsoft Identity Framework.srt 8.08 KB
11. Storing Users and Credentials in a Local Database/05. Inspecting the User Database Schema.mp4 2.94 MB
11. Storing Users and Credentials in a Local Database/05. Inspecting the User Database Schema.srt 3.14 KB
11. Storing Users and Credentials in a Local Database/06. Demo - Creating a User Database.mp4 15.22 MB
11. Storing Users and Credentials in a Local Database/06. Demo - Creating a User Database.srt 7.25 KB
11. Storing Users and Credentials in a Local Database/07. Interacting with IdentityServer.mp4 3.27 MB
11. Storing Users and Credentials in a Local Database/07. Interacting with IdentityServer.srt 3.01 KB
11. Storing Users and Credentials in a Local Database/08. Demo - Inspecting UI Interaction with IdentityServer.mp4 18.06 MB
11. Storing Users and Credentials in a Local Database/08. Demo - Inspecting UI Interaction with IdentityServer.srt 9.79 KB
11. Storing Users and Credentials in a Local Database/09. Demo - Inspecting the User Service.mp4 3.93 MB
11. Storing Users and Credentials in a Local Database/09. Demo - Inspecting the User Service.srt 2.20 KB
11. Storing Users and Credentials in a Local Database/10. Demo - Integrating IdentityServer with a Custom User Database.mp4 11.18 MB
11. Storing Users and Credentials in a Local Database/10. Demo - Integrating IdentityServer with a Custom User Database.srt 4.65 KB
11. Storing Users and Credentials in a Local Database/11. Building Your Identity with a Profile Service.mp4 2.44 MB
11. Storing Users and Credentials in a Local Database/11. Building Your Identity with a Profile Service.srt 2.29 KB
11. Storing Users and Credentials in a Local Database/12. Demo - Building Your Identity with a Profile Service.mp4 9.91 MB
11. Storing Users and Credentials in a Local Database/12. Demo - Building Your Identity with a Profile Service.srt 4.69 KB
11. Storing Users and Credentials in a Local Database/13. Summary.mp4 3.39 MB
11. Storing Users and Credentials in a Local Database/13. Summary.srt 3.05 KB
12. Best Practices for User Management/01. Coming Up.mp4 1.37 MB
12. Best Practices for User Management/01. Coming Up.srt 1.14 KB
12. Best Practices for User Management/02. Where Should User Management Screens Live-.mp4 3.59 MB
12. Best Practices for User Management/02. Where Should User Management Screens Live-.srt 3.35 KB
12. Best Practices for User Management/03. Demo - Implementing a User Registration Screen.mp4 34.01 MB
12. Best Practices for User Management/03. Demo - Implementing a User Registration Screen.srt 17.08 KB
12. Best Practices for User Management/04. Safely Storing Passwords.mp4 11.52 MB
12. Best Practices for User Management/04. Safely Storing Passwords.srt 11.26 KB
12. Best Practices for User Management/05. Demo - Safely Storing Passwords.mp4 13.44 MB
12. Best Practices for User Management/05. Demo - Safely Storing Passwords.srt 6.55 KB
12. Best Practices for User Management/06. Activating an Account.mp4 2.57 MB
12. Best Practices for User Management/06. Activating an Account.srt 2.57 KB
12. Best Practices for User Management/07. Demo - Activating an Account.mp4 30.61 MB
12. Best Practices for User Management/07. Demo - Activating an Account.srt 15.48 KB
12. Best Practices for User Management/08. Additional User Management Related Best Practices.mp4 5.51 MB
12. Best Practices for User Management/08. Additional User Management Related Best Practices.srt 5.03 KB
12. Best Practices for User Management/09. Password Policy Best Practices.mp4 2.65 MB
12. Best Practices for User Management/09. Password Policy Best Practices.srt 2.52 KB
12. Best Practices for User Management/10. Summary.mp4 2.14 MB
12. Best Practices for User Management/10. Summary.srt 2.04 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/01. Coming Up.mp4 1.89 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/01. Coming Up.srt 1.71 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/02. Handling Integration with Third-party Providers.mp4 5.46 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/02. Handling Integration with Third-party Providers.srt 5.50 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/03. Use Cases for Windows Authentication.mp4 1.77 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/03. Use Cases for Windows Authentication.srt 1.67 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/04. Windows Authentication Beneath the Covers.mp4 4.12 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/04. Windows Authentication Beneath the Covers.srt 3.88 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/05. Demo - Enabling Windows Authentication on IIS Express.mp4 9.93 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/05. Demo - Enabling Windows Authentication on IIS Express.srt 5.07 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/06. Demo - Integrating Windows Authentication with IdentityServer.mp4 25.08 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/06. Demo - Integrating Windows Authentication with IdentityServer.srt 13.83 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/07. Federation with Third-party Identity Providers.mp4 5.13 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/07. Federation with Third-party Identity Providers.srt 5.24 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/08. Demo - Inspecting Support for Federating with a Third-party Identity Provider.mp4 17.52 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/08. Demo - Inspecting Support for Federating with a Third-party Identity Provider.srt 8.75 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/09. Integrating with Microsoft Entra ID (Azure Active Directory).mp4 3.13 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/09. Integrating with Microsoft Entra ID (Azure Active Directory).srt 1.59 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/10. Demo - Registering an Application on Azure AD.mp4 12.53 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/10. Demo - Registering an Application on Azure AD.srt 7.47 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/11. Demo - Integrating with Azure AD.mp4 16.58 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/11. Demo - Integrating with Azure AD.srt 8.29 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/12. Demo - Registering an Application on Facebook.mp4 7.22 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/12. Demo - Registering an Application on Facebook.srt 5.08 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/13. Demo - Integrating with Facebook.mp4 11.91 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/13. Demo - Integrating with Facebook.srt 5.70 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/14. Challenges When Integrating with Third-party Identity Providers.mp4 4.28 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/14. Challenges When Integrating with Third-party Identity Providers.srt 4.34 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/15. Integrating with Other Third-party Identity Providers.mp4 2.94 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/15. Integrating with Other Third-party Identity Providers.srt 1.97 KB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/16. Summary.mp4 4.13 MB
13. Integrating with Active Directory, Microsoft Entra ID, and Social Logins/16. Summary.srt 3.62 KB
14. User Provisioning, Federation, and Federated Identity/01. Coming Up.mp4 1.30 MB
14. User Provisioning, Federation, and Federated Identity/01. Coming Up.srt 1.13 KB
14. User Provisioning, Federation, and Federated Identity/02. Integrating Local Users with External Users.mp4 2.15 MB
14. User Provisioning, Federation, and Federated Identity/02. Integrating Local Users with External Users.srt 2.16 KB
14. User Provisioning, Federation, and Federated Identity/03. Federated Authentication and Federated Identity.mp4 5.17 MB
14. User Provisioning, Federation, and Federated Identity/03. Federated Authentication and Federated Identity.srt 4.88 KB
14. User Provisioning, Federation, and Federated Identity/04. Demo - Enhancing the Database Schema for Federated Identity.mp4 8.10 MB
14. User Provisioning, Federation, and Federated Identity/04. Demo - Enhancing the Database Schema for Federated Identity.srt 4.10 KB
14. User Provisioning, Federation, and Federated Identity/05. Demo - Provisioning a New User with a Federated Identity (Part 1).mp4 19.17 MB
14. User Provisioning, Federation, and Federated Identity/05. Demo - Provisioning a New User with a Federated Identity (Part 1).srt 8.06 KB
14. User Provisioning, Federation, and Federated Identity/06. Transforming Claims.mp4 1.32 MB
14. User Provisioning, Federation, and Federated Identity/06. Transforming Claims.srt 1.22 KB
14. User Provisioning, Federation, and Federated Identity/07. Demo - Provisioning a New User with a Federated Identity (Part 2).mp4 9.90 MB
14. User Provisioning, Federation, and Federated Identity/07. Demo - Provisioning a New User with a Federated Identity (Part 2).srt 4.25 KB
14. User Provisioning, Federation, and Federated Identity/08. Provisioning a New User with a Federated Identity – Flow Variations.mp4 2.89 MB
14. User Provisioning, Federation, and Federated Identity/08. Provisioning a New User with a Federated Identity – Flow Variations.srt 2.73 KB
14. User Provisioning, Federation, and Federated Identity/09. Demo - Linking a Provider to an Existing User.mp4 19.44 MB
14. User Provisioning, Federation, and Federated Identity/09. Demo - Linking a Provider to an Existing User.srt 8.45 KB
14. User Provisioning, Federation, and Federated Identity/10. Additional Federated Identity Use Cases.mp4 2.13 MB
14. User Provisioning, Federation, and Federated Identity/10. Additional Federated Identity Use Cases.srt 2.06 KB
14. User Provisioning, Federation, and Federated Identity/11. Summary.mp4 2.73 MB
14. User Provisioning, Federation, and Federated Identity/11. Summary.srt 2.37 KB
15. Supporting Multi-factor Authentication/01. Coming Up.mp4 984.41 KB
15. Supporting Multi-factor Authentication/01. Coming Up.srt 895 B
15. Supporting Multi-factor Authentication/02. Introducing Multi-factor Authentication.mp4 3.52 MB
15. Supporting Multi-factor Authentication/02. Introducing Multi-factor Authentication.srt 3.43 KB
15. Supporting Multi-factor Authentication/03. Supporting MFA with a One-Time Password Through Email.mp4 3.13 MB
15. Supporting Multi-factor Authentication/03. Supporting MFA with a One-Time Password Through Email.srt 2.86 KB
15. Supporting Multi-factor Authentication/04. Supporting MFA with an Authenticator Application.mp4 7.32 MB
15. Supporting Multi-factor Authentication/04. Supporting MFA with an Authenticator Application.srt 6.90 KB
15. Supporting Multi-factor Authentication/05. Demo - Supporting MFA with an Authenticator Application (Enhancing the Database Schema).mp4 3.97 MB
15. Supporting Multi-factor Authentication/05. Demo - Supporting MFA with an Authenticator Application (Enhancing the Database Schema).srt 1.81 KB
15. Supporting Multi-factor Authentication/06. Supporting MFA with an Authenticator Application (Registration).mp4 31.17 MB
15. Supporting Multi-factor Authentication/06. Supporting MFA with an Authenticator Application (Registration).srt 16.35 KB
15. Supporting Multi-factor Authentication/07. Supporting MFA with an Authenticator Application - Authentication.mp4 3.52 MB
15. Supporting Multi-factor Authentication/07. Supporting MFA with an Authenticator Application - Authentication.srt 3.59 KB
15. Supporting Multi-factor Authentication/08. Demo - Supporting MFA with an Authenticator Application (Authentication).mp4 11.53 MB
15. Supporting Multi-factor Authentication/08. Demo - Supporting MFA with an Authenticator Application (Authentication).srt 5.48 KB
15. Supporting Multi-factor Authentication/09. Summary.mp4 2.23 MB
15. Supporting Multi-factor Authentication/09. Summary.srt 1.88 KB
16. Integrating with ASP.NET Core Identity/01. Coming Up.mp4 457.05 KB
16. Integrating with ASP.NET Core Identity/01. Coming Up.srt 386 B
16. Integrating with ASP.NET Core Identity/02. Integrating with ASP.NET Core Identity.mp4 2.23 MB
16. Integrating with ASP.NET Core Identity/02. Integrating with ASP.NET Core Identity.srt 2.19 KB
16. Integrating with ASP.NET Core Identity/03. Demo - Adding ASP.NET Core Identity to the IDP Project.mp4 27.93 MB
16. Integrating with ASP.NET Core Identity/03. Demo - Adding ASP.NET Core Identity to the IDP Project.srt 13.18 KB
16. Integrating with ASP.NET Core Identity/04. Linking IdentityServer to ASP.NET Core Identity.mp4 13.11 MB
16. Integrating with ASP.NET Core Identity/04. Linking IdentityServer to ASP.NET Core Identity.srt 6.33 KB
16. Integrating with ASP.NET Core Identity/05. Summary.mp4 747.58 KB
16. Integrating with ASP.NET Core Identity/05. Summary.srt 681 B
17. Getting Ready for Production and Deploying Your Identity Provider/01. Coming Up.mp4 1.33 MB
17. Getting Ready for Production and Deploying Your Identity Provider/01. Coming Up.srt 1.11 KB
17. Getting Ready for Production and Deploying Your Identity Provider/02. Deploying IdentityServer to Azure.mp4 9.74 MB
17. Getting Ready for Production and Deploying Your Identity Provider/02. Deploying IdentityServer to Azure.srt 10.91 KB
17. Getting Ready for Production and Deploying Your Identity Provider/03. Demo - Persisting Configuration Data.mp4 24.92 MB
17. Getting Ready for Production and Deploying Your Identity Provider/03. Demo - Persisting Configuration Data.srt 12.90 KB
17. Getting Ready for Production and Deploying Your Identity Provider/04. Demo - Persisting Operational Data.mp4 7.08 MB
17. Getting Ready for Production and Deploying Your Identity Provider/04. Demo - Persisting Operational Data.srt 3.67 KB
17. Getting Ready for Production and Deploying Your Identity Provider/05. Demo - Moving From SQLite to SQL Azure.mp4 14.17 MB
17. Getting Ready for Production and Deploying Your Identity Provider/05. Demo - Moving From SQLite to SQL Azure.srt 7.16 KB
17. Getting Ready for Production and Deploying Your Identity Provider/06. Demo - Configuring Data Protection.mp4 22.88 MB
17. Getting Ready for Production and Deploying Your Identity Provider/06. Demo - Configuring Data Protection.srt 12.95 KB
17. Getting Ready for Production and Deploying Your Identity Provider/07. Demo - Storing Key Material in Azure KeyVault.mp4 19.60 MB
17. Getting Ready for Production and Deploying Your Identity Provider/07. Demo - Storing Key Material in Azure KeyVault.srt 9.10 KB
17. Getting Ready for Production and Deploying Your Identity Provider/08. Demo - Configuring and Using the Forwarded Headers Middleware.mp4 6.78 MB
17. Getting Ready for Production and Deploying Your Identity Provider/08. Demo - Configuring and Using the Forwarded Headers Middleware.srt 3.71 KB
17. Getting Ready for Production and Deploying Your Identity Provider/09. Demo - Applying a License.mp4 3.51 MB
17. Getting Ready for Production and Deploying Your Identity Provider/09. Demo - Applying a License.srt 1.71 KB
17. Getting Ready for Production and Deploying Your Identity Provider/10. Demo - The Final Deployment.mp4 15.36 MB
17. Getting Ready for Production and Deploying Your Identity Provider/10. Demo - The Final Deployment.srt 9.15 KB
17. Getting Ready for Production and Deploying Your Identity Provider/11. Summary.mp4 4.10 MB
17. Getting Ready for Production and Deploying Your Identity Provider/11. Summary.srt 3.75 KB
asp-dot-net-core-6-securing-oauth-2-openid-connect.zip 256.28 MB
No trackers found

TorrentBank
Copyright © 2024