Click here to Skip to main content
15,946,342 members
Everything / Security / Identity

Identity

Identity

Great Reads

by Maximiliano Rios
How to use the new Identity framework with external authentication services such as Google, Facebook, Twitter and so forth, retrieving information from users profiles. Including NInject integration.
by Zijian
Reusable codes for OAuth security in business applications
by Zijian
Share Identity Bearer Tokens among Distributed ASP.NET Core Web APIs
by Wessel Beulink
Azure API Center Portal streamlines API management; Visual Studio Code extension enhances collaboration and productivity within Azure ecosystem.

Latest Articles

by Zijian
Reusable codes for OAuth security in business applications
by Zijian
Share Identity Bearer Tokens among Distributed ASP.NET Core Web APIs
by Wessel Beulink
Azure API Center Portal streamlines API management; Visual Studio Code extension enhances collaboration and productivity within Azure ecosystem.
by Denny Boechat
The Importance of Secure Authentication in Web Applications and the Role of Identity Providers

All Articles

Sort by Score

Identity 

U 12 Jul 2024 by Zijian
Reusable codes for OAuth security in business applications
11 May 2024 by Zijian
Share Identity Bearer Tokens among Distributed ASP.NET Core Web APIs
16 Sep 2014 by John Atten
Earlier this year we looked at Implementing Group-Based Permissions Management using the ASP.NET Identity 1.0 framework. The objective of that project was to gain a little more granular control of application authorization, by treating the now-familiar Identity Role as more of a "permission" which c
6 Nov 2014 by John Atten
In recent posts, I've covered a lot of ground using ASP.NET Identity 2.0 in the context of an MVC application. Since it's RTM in March of this year, Identity 2.0 has offered a substantial expansion of the Authentication/Authorization . toolset available to MVC applications. Similarly, Identity 2.0
10 Apr 2023 by Denny Boechat
The Importance of Secure Authentication in Web Applications and the Role of Identity Providers