We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Security, Identity and Authorization in ASP.NET 5

00:00

Formal Metadata

Title
Security, Identity and Authorization in ASP.NET 5
Alternative Title
A run around the new ASP.NET Data Protection - Authorization Stacks
Title of Series
Number of Parts
133
Author
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
With the advent of ASP.NET v5 we’ve taken the opportunity to throw away the old, bad things and drag code kicking and screaming into 2015. We killed [Authorize(Users=)] and replaced it with something more flexible and more configurable. We switched to claims everything. We finally got rid of machine key as well, and have replaced it with something that rotates keys, syncs cross instances of Azure websites and could even use an NTFS share or a database as a key store. By the end of this session you should be prepared to bring in the new and improved bits to help you security your apps in a more flexible and testable way.
WeightInformation securityApplication service providerAuthorizationIdentity managementSoftware developerKey (cryptography)Coding theoryVirtual machineLimit (category theory)Rule of inferenceWritingExpressionMachine codeSynchronizationPoint cloudPhysical systemDefault (computer science)ArchitectureInstance (computer science)Information securityBitWeightSoftware repositoryData storage deviceVideo gamePresentation of a groupDemo (music)Default (computer science)Computer fileSynchronizationServer (computing)Exterior algebraMultiplication signMathematicsWeb 2.0Information privacyOperating systemKey (cryptography)LoginFilesharing-SystemApplication service providerLink (knot theory)TwitterWebsiteConfiguration spaceCore dumpVirtual machineAxiom of choiceDecision theorySurfaceCuboidGame controllerMachine codeHTTP cookieCartesian coordinate systemMultiplicationRemote procedure callAuthenticationInstance (computer science)Computer architectureAuthorizationImplementationFigurate numberComa BerenicesTraffic reportingWindowInternet service providerPoint cloudGroup actionCoefficient of determinationPhysical systemIdentity managementProjective planePlanningComputer animation
Software developerVideo game consoleWritingoutputString (computer science)Computer wormSampling (statistics)BitEncryptionRevision controlInternet service providerData miningComputer configurationMachine codeSemiconductor memoryKey (cryptography)Sign (mathematics)Different (Kate Ryan album)Electronic signatureMathematicsComa BerenicesInformation privacyUnit testingDerivation (linguistics)outputComputer wormSurfaceComputer animation
Software developerLine (geometry)Machine codeDefault (computer science)Data modelForm (programming)MathematicsWeb 2.0Internet service providerString (computer science)CiphertextLine (geometry)Sampling (statistics)Machine codeDemo (music)Game controllerSoftware testingVideo gamePhysical systemForcing (mathematics)Revision controlParameter (computer programming)Discrete element methodString (computer science)Computer animation
Form (programming)Derivation (linguistics)String (computer science)Software developerRevision controlSpacetimeEuclidean vectorInformation securityToken ringoutputConfiguration spacePhysical systemKey (cryptography)Control flowDefault (computer science)AlgorithmEncryptionComputer wormVideo game consoleStructural loadExpressionElectric currentUser profileWindows RegistryProcess (computing)Virtual machineMobile appSynchronizationRead-only memoryKey (cryptography)Insertion lossUser profileDefault (computer science)EncryptionDirectory serviceFile systemNamespaceIntrusion detection systemWeb 2.0Canonical ensembleGoodness of fitoutputCartesian coordinate systemQuicksortMobile appData centerException handlingProfil (magazine)Message passingData storage deviceVirtual machineApplication service providerWindows RegistryInstance (computer science)Computer fileScripting languageSoftware bug2 (number)Parameter (computer programming)WindowString (computer science)Revision controlConnectivity (graph theory)AlgorithmPhysical systemForm (programming)Type theoryAuthenticationView (database)Video game consoleSampling (statistics)Computing platformInterface (computing)Ring (mathematics)Moving averageMechanism designMathematicsComputer wormIdentifiabilityMultiplication signLengthBefehlsprozessorGastropod shellCASE <Informatik>Power (physics)Proof theorySoftware testingUniform resource locatorBlogInternet forumShared memoryWeightDifferent (Kate Ryan album)Computer animation
Software developerKey (cryptography)Information privacyCASE <Informatik>File systemWindowPattern languagePlanningFigurate numberCore dumpKey (cryptography)WeightInternet service providerWindows RegistryIntegrated development environmentServer (computing)Configuration spaceSynchronizationFood energyWeb 2.0Point cloudPublic key certificateBitComputer fileDirectory serviceComputer animation
Internet service providerConfiguration spaceSoftware developerPublic key certificateEncryptionKey (cryptography)Machine codeCryptographyIntegrated development environmentMechanism designMobile appData storage deviceWritingComputer fileComputer filePattern languageKey (cryptography)Cartesian coordinate systemPublic key certificateInformation privacyInternet service providerServer (computing)Virtual machineApplication service providerDirectory serviceWeb 2.0Sampling (statistics)IdentifiabilityWindowMultiplication signData storage device9 (number)Software testingLimit (category theory)Goodness of fitNormal (geometry)Level (video gaming)PasswordMultiplicationWindows RegistryShared memoryPhysical systemRing (mathematics)Information securitySocial classRoutingInterface (computing)Hecke operatorImplementationBlogChemical equationPoint (geometry)Default (computer science)Machine codeMobile appElectronic program guidePoisson-KlammerCASE <Informatik>Sign (mathematics)AuthenticationHTTP cookie2 (number)Meta elementFilesharing-SystemRootComputer animation
Software developerVirtual machineAlgorithmPoint (geometry)Application service providerWeightSocial classForm (programming)Configuration spaceInformation securityPrice indexAuthenticationHTTP cookieInteractive televisionWeb browserClient (computing)AuthorizationWeb 2.0Coma BerenicesAlgorithmPoint (geometry)Computer wormEncryptionDefault (computer science)HTTP cookieOperator (mathematics)Key (cryptography)Virtual machineQuicksortInformation securityIdentity managementCryptographySystem administrator1 (number)Software developerWindowCartesian coordinate systemCASE <Informatik>Form (programming)Gastropod shellMachine codeWeightDiagramWeb pagePower (physics)MereologyMultiplication signInterface (computing)Functional (mathematics)WebsiteConfiguration spaceShared memorySoftwareWritingDifferent (Kate Ryan album)Information privacyGame controllerBitAttribute grammarLimit (category theory)Application service providerAuthenticationMiddlewareHacker (term)Internet service providerRotationRight angleLastteilungLoginExtension (kinesiology)Computer animation
Numbering schemeComputer configurationAuthenticationLoginAuthorizationHTTP cookieWeb pageWritingCartesian coordinate systemAuthenticationSingle-precision floating-point formatConfiguration spaceCross-site scriptingMobile appComputer configuration3 (number)Hecke operator1 (number)Forcing (mathematics)Computer animation
Identity managementFlagPrincipal idealTexture mappingTransformation (genetics)Software developerIcosahedronIdentity managementMachine codeMappingPrincipal idealObject (grammar)Social classTransformation (genetics)Category of beingType theoryLoginPeer-to-peerBitPlanningOperator (mathematics)Single-precision floating-point formatAuthenticationRoundness (object)Set (mathematics)MiddlewareDivisorHookingComputer animation
Transformation (genetics)Software developerAuthorizationNP-hardCoding theoryAuthenticationSound effectIdentity managementMultiplication signTransformation (genetics)Attribute grammarWordAuthorizationMathematicsAuthenticationGame controllerRule of inferenceToken ringHTTP cookieDirectory serviceWindowType theoryElectronic mailing listMachine codeRight angleDecision theoryImplementationCategory of beingDemo (music)Performance appraisalWeb 2.0Goodness of fitComputer animation
AuthorizationComputer configurationInternet service providerSoftware developerContext awarenessComputer iconData typeParameter (computer programming)System administratorMereologyCombinational logicProjective planeEntire functionMultiplication signPerformance appraisalDependent and independent variablesApplication service providerConfiguration spaceMaxima and minimaInterface (computing)Type theorySocial classInternet service providerSlide ruleAuthorizationElectronic mailing listMachine codeBitExistenceLogical constantContext awarenessCASE <Informatik>Attribute grammarConfidence intervalComputer animation
Software developerContext awarenessPerformance appraisalAuthenticationPerformance appraisalContext awarenessSingle-precision floating-point formatDatabaseOrder (biology)Presentation of a groupPower (physics)Point (geometry)MultiplicationComputer animation
Software developerContext awarenessSpacetimeOvalContent (media)Line (geometry)Data typeString (computer science)FreewareImpulse responseImperative programmingMenu (computing)AuthorizationOrdinary differential equationInternet service providerView (database)MultiplicationGraph coloringWeb pageResultantFunctional (mathematics)Group actionGame controllerAttribute grammarSocial classInformation securityAuthorizationOperator (mathematics)Application service providerMachine codeNumberCountingType theoryAddress spaceView (database)EmailInstance (computer science)GoogolPatch (Unix)Software repositoryRule of inferenceBitDemo (music)Goodness of fitInternet service providerPresentation of a groupVisualization (computer graphics)Imperative programmingJackson-MethodeInjektivitätClassical physicsScripting languageCASE <Informatik>Endliche ModelltheorieDirected graphGame theorySoftware testingMathematicsFacebookPay televisionAuthenticationCopyright infringementLogic gateLoginComputer animation
Software developerAuthorizationOperations researchSystem administratorMilitary operationFluid staticsReading (process)Context awarenessOperator (mathematics)Type theorySystem administratorCombinational logicAuthorizationFunctional (mathematics)Attribute grammarQuicksortPhysical systemSystem callGroup actionSocial classReal numberCoefficient of determinationLibrary (computing)Multiplication signCategory of beingDifferent (Kate Ryan album)Surjective functionComputer animation
Software developerAuthorizationData typeOvalContext awarenessIdentity managementView (database)Machine codeMultiplication signMathematicsBitResultantSampling (statistics)Demo (music)Game controllerContext awarenessLevel (video gaming)Computer animationSource code
Software developerAuthenticationNumbering schemeLimit (category theory)Token ringData modelView (database)AuthorizationWeb 2.0AuthenticationPoint (geometry)Game controllerNumbering schemeException handlingMultiplicationDifferent (Kate Ryan album)Information securityFigurate numberToken ringSampling (statistics)Vulnerability (computing)Goodness of fitSubsetApplication service providerProjective planeMobile WebType theoryComputer animationSource code
Software developerWeightApplication service providerData typeAuthenticationSample (statistics)AuthorizationRule of inferenceElectric currentHTTP cookieDifferent (Kate Ryan album)Sampling (statistics)CuboidIdentity managementPasswordVideo gamePoint (geometry)Token ringSystem callComputer animation
Software developerAuthenticationNumbering schemeLimit (category theory)Token ringComputer configurationAuthorizationInternet service providerOvalChemical equationIdentity managementHTTP cookieNumbering schemeCategory of beingAttribute grammarCASE <Informatik>Product (business)AuthenticationBoss CorporationMultiplicationLine (geometry)Machine codeOffice suiteAuthorizationComputer animation
WeightApplication service providerKeyboard shortcutSoftware developerVariable (mathematics)Integrated development environmentControl flowDefault (computer science)TouchscreenKey (cryptography)Data storage deviceSampling (statistics)Semiconductor memoryIdentity managementCASE <Informatik>Coma BerenicesHoaxDisk read-and-write headWeb 2.0GoogolRevision controlIntegrated development environmentVariable (mathematics)Decision theorySoftware developerCartesian coordinate systemFigurate numberMereologyGame controllerRotationBitQuicksortView (database)Attribute grammarSoftware frameworkEndliche ModelltheorieField (computer science)Lie groupEmailBlogPoint (geometry)Right angleSequelMathematicsSynchronizationInternetworkingConnected spacePresentation of a groupSocial classSensitivity analysisAuthorizationToken ringContext awarenessVirtual machineInformation securityMachine codeProcess (computing)Power (physics)Link (knot theory)Slide ruleVery-high-bit-rate digital subscriber lineError messageCross-site scriptingTouchscreenSubject indexingDefault (computer science)Information privacyForm (programming)WritingValidity (statistics)Application service providerMilitary baseDependent and independent variablesLatent heatShared memoryGoodness of fitDrop (liquid)Tracing (software)Storage area networkComputer animation
Transcript: English(auto-generated)