Step by step setup for the Auth server and the client: IdentityServer4 with .Net Core Part II

Note – You can find the source code of my sample application here. (Note that the code may contain extra code, concentrate on Auth Server and client for now) You can find all .Net core posts here. In my previous post on IdentityServer4, I explained the basics of IdentityServer4 which you can find here. In this post, we … Continue reading Step by step setup for the Auth server and the client: IdentityServer4 with .Net Core Part II

Advertisements

IdentityServer4 in simple words: IdentityServer4 with .Net Core Part I

You can find all .Net core posts here. Once I explored and wrote about Authentication in .Net Core using Identity here, many people have asked me to explore and write on IdentityServer4. So I am starting a series of posts in which I will mainly concentrate on IdentityServer4 In this first post, we will see some … Continue reading IdentityServer4 in simple words: IdentityServer4 with .Net Core Part I

Secure .Net Core applications from the Open Redirect attacks: .Net Core security Part IV

You can find my all .Net core posts here. In these series of posts, we will see how to secure your .Net Core applications. In this post, we will see how to secure your .Net Core application from the Open Redirect attack. What is Open Redirection attack? Open Redirection attack is a URL Redirection. An Open Redirection attack is a kind … Continue reading Secure .Net Core applications from the Open Redirect attacks: .Net Core security Part IV

Secure .Net Core applications from Click Jacking: .Net Core security Part III

You can find my all .Net core posts here. In these series of posts, we will see how to secure your .Net Core applications. In this post, we will see how to secure your .Net Core application from the ClickJacking attack. What is ClickJacking? Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent … Continue reading Secure .Net Core applications from Click Jacking: .Net Core security Part III