We may earn an affiliate commission when you visit our partners.
Chris Klug

There are many ways to do authentication in ASP.NET Core 2.0, and it is sometimes hard to figure out how to set it up. This course aims to simplify that by providing walk throughs of setting up different kinds of authentication and authorization.

Read more

There are many ways to do authentication in ASP.NET Core 2.0, and it is sometimes hard to figure out how to set it up. This course aims to simplify that by providing walk throughs of setting up different kinds of authentication and authorization.

ASP.NET Core 2.0 has changed the way you add authentication and authorization to your applications, and it can be a bit hard to figure out how to do it. This course, ASP.NET Core 2 Authentication Playbook, tries to make this easier by showing you step by step walkthroughs of how you set it up. You will learn how to set up several different kinds of authentication, ranging from local logins to Azure AD. You will also get to see how you can add authorization to your application to make sure that you not only know who the user is, but also can control what he or she is allowed to do. Finally, we will cover using social identity providers like Facebook and Twitter, and the process of letting 3rd party identity providers handle the problems involved in storing user credentials. Each module is aimed to be self contained, and show one particular thing, making it easy to figure out what parts you want to explore. By the end of this course you’ll learn everything you need to know to authenticate and authorize users for your ASP.NET Core applications.

Enroll now

What's inside

Syllabus

Course Overview
Course Introduction
Using Local Logins
Using Social Logins
Read more
Supporting Multiple Social Login Providers
Requesting Extra User Information While Using Social Logins
Authenticating Users Using Azure AD
Authenticating Users Using Azure AD B2C
Authenticating Users Using OpenID Connect and IdentityServer
Securing APIs with Tokens
Using OpenID Connect Hybrid Flow to Call APIs on Behalf of the User
Combining Different Authentication Methods in the Same Application
Doing Claims Transformation
Setting up Authorization
Creating a Custom Authorization Service

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops authentication and authorization skills, which are core to web development
Examines industry-standard authentication and authorization for web applications
Covers a wide range of authentication and authorization methods, allowing learners to choose the best approach for their needs

Save this course

Save ASP.NET Core 2 Authentication Playbook to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in ASP.NET Core 2 Authentication Playbook with these activities:
Review the basics of ASP.NET Core
Reviewing the fundamentals will help you refresh your knowledge of ASP.NET Core and make the course material more accessible.
Browse courses on C#
Show steps
  • Read through the ASP.NET Core documentation
  • Create a simple ASP.NET Core application
  • Deploy your application to a web server
Authentication Resources Collection
Organize and expand your understanding of authentication mechanisms by compiling a collection of useful resources, including documentation, tutorials, and blog posts.
Show steps
  • Gather resources related to ASP.NET Core 2 authentication.
  • Organize the resources into categories.
  • Share the compilation with peers or online communities.
Find a mentor who can provide guidance on ASP.NET Core authentication
Finding a mentor can provide you with personalized guidance and support as you learn about ASP.NET Core authentication.
Browse courses on Authorization
Show steps
  • Identify potential mentors
  • Reach out to potential mentors
  • Build a relationship with your mentor
12 other activities
Expand to see all activities and additional details
Show all 15 activities
Follow a tutorial on ASP.NET Core authentication
Following a tutorial will provide you with step-by-step instructions on how to implement authentication in your ASP.NET Core application.
Browse courses on Authorization
Show steps
  • Find a tutorial that covers the type of authentication you want to implement
  • Follow the tutorial's instructions
  • Test your implementation
Authentication Concepts Practice
Reinforce your understanding of key authentication and authorization concepts by completing practice quizzes and exercises.
Browse courses on Authentication
Show steps
  • Take a practice quiz on authentication concepts.
  • Complete a coding exercise to implement a simple authentication mechanism.
Attend a study group or online forum dedicated to ASP.NET Core authentication
Attending a study group or online forum will allow you to connect with other learners and discuss ASP.NET Core authentication.
Browse courses on Authorization
Show steps
  • Find a study group or online forum dedicated to ASP.NET Core authentication
  • Participate in discussions
  • Ask questions
  • Help other learners
Authentication and Authorization Discussion Group
Engage with peers to exchange knowledge, clarify concepts, and discuss best practices for authentication and authorization in ASP.NET Core 2 applications.
Browse courses on Authentication
Show steps
  • Join an online or in-person discussion group focused on ASP.NET Core 2 authentication and authorization.
  • Participate in discussions, ask questions, and share your experiences.
Practice implementing different types of authentication in ASP.NET Core
Practicing implementing different types of authentication will help you become more proficient in using ASP.NET Core authentication.
Browse courses on Authorization
Show steps
  • Create a new ASP.NET Core application
  • Implement a different type of authentication in each application
  • Test your implementations
ASP.NET Core 2 Authentication Setup
Develop a deeper understanding of how to set up various authentication mechanisms in ASP.NET Core 2 by setting up a sample project.
Browse courses on Authentication
Show steps
  • Create a new ASP.NET Core 2 project.
  • Configure authentication services in the Startup class.
  • Implement the authentication middleware in the Configure method.
  • Test the authentication flow by creating a login page and a protected resource page.
Social Login Integration with IdentityServer4
Expand your knowledge of social login integration by following guided tutorials on setting up IdentityServer4 with popular social providers like Facebook and Twitter.
Browse courses on Authentication
Show steps
  • Find a tutorial on integrating IdentityServer4 with a social login provider.
  • Follow the tutorial steps to configure IdentityServer4 and the social login provider.
  • Test the social login integration by logging in with a social account.
Create a blog post or article on ASP.NET Core authentication
Creating a blog post or article will help you solidify your understanding of ASP.NET Core authentication by explaining it to others.
Browse courses on Authorization
Show steps
  • Choose a topic for your blog post or article
  • Research your topic
  • Write your blog post or article
  • Publish your blog post or article
Custom Authorization Policy
Develop a custom authorization policy to control access to specific resources in your application, enhancing your understanding of authorization mechanisms.
Browse courses on Authorization
Show steps
  • Identify the resource to be protected.
  • Define the authorization requirements.
  • Implement the custom authorization policy.
  • Test the authorization policy by accessing the protected resource.
Participate in a hackathon or coding competition that involves ASP.NET Core authentication
Participating in a hackathon or coding competition will challenge you to apply your ASP.NET Core authentication skills in a real-world scenario.
Browse courses on Authorization
Show steps
  • Find a hackathon or coding competition that involves ASP.NET Core authentication
  • Form a team or work on your own
  • Develop a solution to the challenge
  • Submit your solution
Mentor a Junior Developer
Solidify your understanding of authentication concepts by mentoring a junior developer and guiding them through the setup and implementation process.
Show steps
  • Identify a junior developer who is interested in learning about authentication.
  • Provide guidance and support on setting up and implementing authentication mechanisms.
  • Answer questions and troubleshoot any issues they encounter.
Contribute to an open-source project related to ASP.NET Core authentication
Contributing to an open-source project will allow you to learn from others and make a valuable contribution to the community.
Browse courses on Authorization
Show steps
  • Find an open-source project related to ASP.NET Core authentication
  • Identify an area where you can contribute
  • Make a contribution
  • Submit a pull request

Career center

Learners who complete ASP.NET Core 2 Authentication Playbook will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course helps build a foundation in setting up authentication and authorization, a key part of cybersecurity. Course attendees will learn to set up multiple kinds of authentication and authorization systems such as local logins and social logins.
Security Architect
Security Architects design, build, and maintain secure computer systems and networks. Course attendees will learn to set up several different kinds of authentication, a key part of a security architect's job. Additionally, they will be introduced to protecting web APIs with OAuth 2.0 and OpenID Connect.
Security Engineer
Security Engineers protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course helps build a foundation in setting up authentication and authorization, a key aspect of network security. Course attendees will learn to set up multiple kinds of authentication and authorization systems such as local logins and social logins.
Systems Analyst
Systems Analysts study an organization's current business processes and develop plans to improve them. Course material in authentication and authorization are core skills for this job. A systems analyst must be able to secure and manage a company's networks and systems.
Information Security Analyst
Information Security Analysts plan and carry out security measures to protect an organization's computer networks and systems. Course participants will gain knowledge of setting up authorization, a key part of keeping systems secure. They will also be introduced to topics such as claims transformation and social identity providers.
Database Administrator
Database Administrators maintain and optimize database management systems. Course attendees will learn how to set up authentication and authorization to protect databases, a critical aspect of their job. This course will also introduce the concept of doing claims transformation.
Web Developer
Web Developers design and develop websites and web applications. This course can help teach the basics of integrating authentication and authorization into web applications, a process that is central to the job. This course will also introduce aspects of securing APIs with tokens.
Network Engineer
Network Engineers design, build, and maintain computer networks. This course helps build a foundation in setting up authentication and authorization, a key part of managing networks. It will also teach aspects of securing APIs with tokens.
Software Developer
Software Developers build, maintain, and improve software products. Course attendees will be prepared to secure software applications using industry-standard patterns and techniques. These applications may be web-based, mobile-based, or desktop-based. Once hired, one may also provide technical support to users by diagnosing and resolving issues with the software.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure that they are secure and compliant with regulations. This course may be useful in getting an overview of authentication and authorization concepts so that an IT auditor can better evaluate these systems.
Threat Intelligence Analyst
Threat Intelligence Analysts identify, assess, and mitigate threats to an organization's computer systems and networks. This course may be useful in getting an overview of authentication and authorization concepts so that a threat intelligence analyst can better understand how attackers might try to exploit these systems.
Quality Assurance Analyst
Quality Assurance Analysts test software to find bugs and ensure that it meets quality standards. This course may be useful for learning about authentication and authorization so that a QA Analyst can better test these features in the software they evaluate.
Technical Writer
Technical Writers create documentation for software and other technical products. This course may be useful for giving a technical writer the information they need to document authentication and authorization systems.
Project Manager
Project Managers plan, execute, and close projects. While not as technical as the other roles on this list, a project manager must be aware of authentication and authorization concepts as they may need to discuss these requirements with their team or make budget allocation decisions for the security features of a project. This course may be useful in getting an overview of these concepts for this purpose.
Business Analyst
Business Analysts analyze an organization's business needs and develop solutions to improve them. This course may be useful in getting an overview of authentication and authorization concepts so that a business analyst can better discuss these requirements with their team.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in ASP.NET Core 2 Authentication Playbook.
Provides a comprehensive overview of web security, which will be particularly useful for understanding the security risks associated with authentication and authorization.
Provides a comprehensive overview of security engineering, which will be particularly useful for understanding the security risks associated with authentication and authorization.
Covers building modern, cloud-based web applications using ASP.NET Core MVC 2, including authentication and authorization.
Covers building fullstack web applications using ASP.NET Core 2 and Angular 6, including authentication and authorization.
Covers performance optimization techniques for ASP.NET Core 2 applications, including authentication and authorization.
Is useful if you need to extend the concepts in this course to include using Angular with ASP.NET Core.
Provides a practical guide to security in ASP.NET Core applications, including authentication and authorization.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to ASP.NET Core 2 Authentication Playbook.
ASP.NET Core SignalR Fundamentals
Most relevant
Docker Images and Containers for ASP.NET Core 2
Most relevant
ASP.NET Core Clean Architecture
Most relevant
Architecting ASP.NET Core 3 Applications: Best Practices
Most relevant
Authentication and Authorization in ASP.NET Core Web API
Most relevant
ASP.NET Authentication: The Big Picture
Most relevant
Authentication and Authorization in ASP.NET Core
Most relevant
Secure Coding in ASP.NET Core
Most relevant
Minimal API Development with ASP.NET Core
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser