Book Image

Learning ASP.NET Core 2.0

By : Jason De Oliveira, Michel Bruchet
Book Image

Learning ASP.NET Core 2.0

By: Jason De Oliveira, Michel Bruchet

Overview of this book

The ability to develop web applications that are highly efficient but also easy to maintain has become imperative to many businesses. ASP.NET Core 2.0 is an open source framework from Microsoft, which makes it easy to build cross-platform web applications that are modern and dynamic. This book will take you through all of the essential concepts in ASP.NET Core 2.0, so you can learn how to build powerful web applications. The book starts with a brief introduction to the ASP.NET Core framework and the improvements made in the latest release, ASP.NET Core 2.0. You will then build, test, and debug your first web application very quickly. Once you understand the basic structure of ASP.NET Core 2.0 web applications, you'll dive deeper into more complex concepts and scenarios. Moving on, we'll explain how to take advantage of widely used frameworks such as Model View Controller and Entity Framework Core 2 and you'll learn how to secure your applications. Finally, we'll show you how to deploy and monitor your applications using Azure, AWS, and Docker. After reading the book, you'll be able to develop efficient and robust web applications in ASP.NET Core 2.0 that have high levels of customer satisfaction and adoption.
Table of Contents (19 chapters)
Title Page
Credits
Foreword
About the Authors
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Summary


In this chapter, you have learned how to secure ASP.NET Core 2.0 applications, including managing authentication and authorization for your application users.

You have added basic forms authentication, and more advanced external provider authentication via Facebook, to the example application. This should give you some good ideas on how to approach these important topics in your own applications.

Furthermore, you have learned how to add standard reset password mechanisms, because users forget their passwords all the time and you need to respond to this type of request as securely as possible.

We have even talked about two-factor authentication, which can provide an even higher security level for critical applications.

In the end, you have seen how to handle authorizations in multiple ways (basic, roles, policies), so that you can decide which approach is best suited to your specific use case.

In the next chapter, we will talk about the different options you will have when hosting and...