That's how a tutorial should look like! Straight to point with a working example. Love it! 😎🤩
@DotNetCoreCentral Жыл бұрын
Thanks!
@drakZes3 жыл бұрын
Easy and great setup of how to add authorization to a web application. Well done!
@DotNetCoreCentral3 жыл бұрын
@Francois Smit, thanks for watching!
@naveen.bhardwaj2 жыл бұрын
Awsm Explanation, Easy to understand
@darizardTheDargon2 жыл бұрын
Add my voice to the chorus. Insanely helpful and well-done video, thank you.
@DotNetCoreCentral2 жыл бұрын
Thanks!
@ch19952 жыл бұрын
May I know the use of having the AuthenticationManager interface instead of just having a solid Class? thanks
@amjster3 жыл бұрын
Excellent video, I have shared with my whole team to watch. Thank you. One question, at 15:56 you add the JwtTokenAuthenticationManager to services with the key, but what if you wanted to pass in the DbContext and also maybe the ILogger so the JwtTokenAuthenticationManager can confirm the credentials against the Db. How do you configure the services for the JwtTokenAuthenticationManager in startup to inject those into the class?
@avtarsashia48973 жыл бұрын
Awsome way of teaching. And working with real scenario.
@DotNetCoreCentral3 жыл бұрын
@Avtar Sashia, thanks for watching!
@hhcruz19993 жыл бұрын
I am able to generate the token. I am also getting the data without authorisation. But when I give the Authorize for the get method I get unauthorised. Could you please help me solve this issue.
@junaidm10383 жыл бұрын
This is the most simple way of doing JWT , thanks so much
@DotNetCoreCentral3 жыл бұрын
@junaid m, thanks for watching!
@R2d2ums3 жыл бұрын
Dude!! Thx for the video! It really helped me out. Right know I'm just reading your blog to understand better the whole code.
@DotNetCoreCentral3 жыл бұрын
@Carlos Daza, thanks!
@vigneashselvaraj3592 Жыл бұрын
In this JWT is authorized when sent as header in the request. May I know how can the access token be validate as part of query string ?
@DotNetCoreCentral Жыл бұрын
its a good practice to send token as part of header, but nothing stops you from sending token in query string, there are use cases like websocket where you might need to pass it in query string
@usmansiddiqui18542 жыл бұрын
Guys I am confused here that the implementation of JWT here is working on O Auth 2.0 mechanism or not?
@vigneashselvaraj3592 Жыл бұрын
Excellent content.. very straight forward
@DotNetCoreCentral Жыл бұрын
Thanks!
@Ram-yk7yl3 жыл бұрын
This worked like a charm. Exactly what I was looking for..., Confused with various online material, but this was most clear of all of them...
@DotNetCoreCentral3 жыл бұрын
@Ra m, thanks for watching the video, and glad this video helped you!
@BhautikDalicha2 жыл бұрын
How we can achieve same thing in MVC and pass token after authentication?
@davidemmanuel30013 жыл бұрын
God bless you my friend for this video
@DotNetCoreCentral3 жыл бұрын
@DAVID EMMANUEL, thanks for watching!
@nirbhaysinghverynice5880 Жыл бұрын
really nice explanation to the point and explained every point thanks alot
@RahulKumar-tf3cx3 жыл бұрын
Thank you Nirjhar. Great explanation.I have implemented with your example
@DotNetCoreCentral3 жыл бұрын
@Rahul Sharma, thanks for watching!
@shubhamshaw23603 жыл бұрын
Hi, why did you uncheck the "Configure for HTTPS" and check "Docker enabled" option while creating the project? It'll be really helpful info if you tell us.
@DotNetCoreCentral3 жыл бұрын
@Shubham Shaw, there is no particular reason. You can keep both enabled.
@johnnybravo8932 Жыл бұрын
If you configure https you will need SSL certificate. While running in localhost you can do with http.
@tertulianeo3 жыл бұрын
My Authorization header is missing IDK why but I don't have problems with other headers, is there a way to change the header name?
@DotNetCoreCentral3 жыл бұрын
@tertulianeo, how are you passing the header? can you share the code?
@tertulianeo3 жыл бұрын
@@DotNetCoreCentral ty, it was a problem with my cloud front
@DotNetCoreCentral3 жыл бұрын
@@tertulianeo great to hear your issue is resolved!
@DevKumar-nh6vk Жыл бұрын
Love the video. I urge you to create video on OAuth with JWT implementation. Complete details on OAuth.
@DotNetCoreCentral Жыл бұрын
Thanks, will do!
@varmasanjaym4 жыл бұрын
Hi, I see that the AuthenticationHandler class comes under two namespaces. - Microsoft.AspNetCore.Authentication - Microsoft.Owin.Security.Infrastructure could you please explain what factors decide the namespace I need to use.
@DotNetCoreCentral4 жыл бұрын
@sanjay varma, Microsoft.Owin.Security.Infrastructure is the legacy namespace. If you are using ASP.Net Core 3.1 you should be using Microsoft.AspNetCore.Authentication .
@nileshmore18202 жыл бұрын
Very good explanation. thank you .
@ravindranaths5134 жыл бұрын
Hi, at timeline of 11:26 in this video, you added 1 hour as expiration. I tried with 1 min. But, after 2 min also, I could able to use same token and get the data. Means: token is not expired. Could you please help me on this.
@DotNetCoreCentral4 жыл бұрын
@Ravindranath S, I will try it out and let you know.
@umairghouri17184 жыл бұрын
@@DotNetCoreCentral we have to use UseExpirationValidation in AddJwtBearer configuation
@DotNetCoreCentral4 жыл бұрын
@@umairghouri1718 thanks for the suggestion!
@ProperComment4 жыл бұрын
Why wasn't I able to find this channel earlier 😭 🤣🤣 I've shared your content with all my colleagues 🙏
@DotNetCoreCentral4 жыл бұрын
@The Red Baron, thanks for watching. I hope everyone you have shared with will find it useful.
@chandusubhakarareddysatti35693 жыл бұрын
Hi Thaks for the video, I have a couple of questions . can you please clarify this? 1. I got a token from the server. I just passed it to someone to use this token. he could able to access the API with the token until it expires. How can we restrict this? 2. I got a token from the server with an expiry time of 15 min. before 15 min I hit token controller and got another token with an expiry time of 15 min. Now I have two tokens with valid time. will the two tokens work? or only the latest one? if so how can we validate?
@DotNetCoreCentral3 жыл бұрын
@Chandu Subhakara Reddy Satti 1. If you pass the token to someone else purposefully, there is nothing that can be done here right. Until the token expires that person will have access to your API unless you keep all tokens in storage and check against that, in which case you can flag the token. 2. It depends if you are keeping the tokens in storage, in that case, you can have an implementation of invalidating older tokens when you send out new tokens. Otherwise, both will be valid.
@deepjyotyroy66763 жыл бұрын
Thanks for the Awesome Video. But I have a question. If I need to create a Custom Unathorized return message from any POST or GET api, what should I do ?
@DotNetCoreCentral3 жыл бұрын
@Deepjyoty Roy, thanks for watching! In your scenario, you can remove the Authorize attribute and inside of each method check for User.Identity.IsAuthenticated, and based on that throw Unauthorised with you custom messages per method.
@CAPS_AMERICA2 жыл бұрын
your tutorial is amazing, the IT community needs more people like you! however, MICROSOFT SUCKS for implementing a million different classes and ways to implement authentication /authorization classes then those classes get deprecated and then the developer will be scrambling for answers to solutions that new core version/framework is trying to introduce! For MS, there is no one universal, non-complex, non-confusing way to create a simple web API with basic authentication, it's like each authentication scheme is created by one developer that is trying to out-do the other developer within their team that has implemented a recent class/code! I hope, I really, really hope, that MS should one day be overtaken by another company or that incoming new developers will instead switch to open source and other tech stacks for web api-related stuff! I will be the first to rejoice if MS will file for bankrupcy one day, or get bought by Apple!
@pankitpatel19874 жыл бұрын
good help full, if you want to add more things then add authorization with multiple roles, multi-tenant application authentication.
@DotNetCoreCentral4 жыл бұрын
Thanks for the suggestion!
@xinyuhou65353 жыл бұрын
Hi thank you for posting this video. I find it very helpful. I have one question regarding the authentication step though. After receiving the token with a valid username + password combination and entering it as Authorization : Bearer[whitespace]token, the Get step still throws a 401 error. Any idea of what may cause this? Thanks!
@denespapp19633 жыл бұрын
you can raise the logging level in the config and you can see the exact issue resulting in 401
@girijesh-mca4 жыл бұрын
Very nice explanation !!! Just one query I have in simple asp.net api we used Owin and OAuth to generate and validate token but I dint see OAuth implementation in Core is there any reason ?
@DotNetCoreCentral4 жыл бұрын
OAuth can be implemented by a middleware. I do not see any reason why it cannot be. I will give it a try. I did not have the need yet, hence I did not try it yet. I will post my video after I try it out. Thanks for the question.
@girijesh-mca4 жыл бұрын
@@DotNetCoreCentral Thank you so much.
@funnytoddler3753 жыл бұрын
Nice explanation 👌
@DotNetCoreCentral3 жыл бұрын
@Funny Toddler, thanks!
@Imran-mr6fv3 жыл бұрын
Excellent... keep up the good work
@DotNetCoreCentral3 жыл бұрын
@Abc Xyz, thanks for watching!
@vivekgowda15764 жыл бұрын
Hi , Have you used ever redis cache in identity server 4 to improve the preformation
@DotNetCoreCentral4 жыл бұрын
@vivek Gowda, no, I have never used it. But it's a good idea I would guess. I might give it a try.
@vivekgowda15764 жыл бұрын
@@DotNetCoreCentral thank you 😀
@kiranbs50573 жыл бұрын
Nice video , But I feel it would have been been great for beginners like me , if you had spent some time explaining the usage of each line while configuring authentication in startup and controller class files .
@DotNetCoreCentral3 жыл бұрын
@Kiran BS, thanks for watching, and thanks for your valuable feedback, I will surely keep this in mind.
@ajithjacob20544 жыл бұрын
Please help me ,i am getting error from postman when i tried to access get after applying [authorize] error : similar to 403 forbidden, but specifically for use when authentication is possible but has falied or not yet provided.The response must inculde a www -authenticate header field conataining a challenge applicable to the requested resource
@DotNetCoreCentral4 жыл бұрын
@Ajith Jacob, I am not sure I completely understand the question, I will definitely look into it tomorrow, and if I have any doubt about your issue I will get back to you. Thanks!
@ajithjacob20544 жыл бұрын
@@DotNetCoreCentral thanks for your reply. Let me explain the error.i have implemented the jwt token functionality and set attribute as allowanomus . So from postman i am able to generate the token . Then I decorated the get action method with authorize attribute and tried to access it from postman using the jwt token generated, that time I am getting the above error from postman
@DotNetCoreCentral4 жыл бұрын
@@ajithjacob2054 I tried to reproduce your issue, but since I am not able to see your code its hard to reproduce. This is the location of the demo code, where I am not able to reproduce the issue. Maybe if you compare your code with mine, you will be able to get some clue what is going on. github.com/choudhurynirjhar/auth-demo
@evaapperson17603 жыл бұрын
Very quality content. It very helped me to understand this important theme !:)
@DotNetCoreCentral3 жыл бұрын
@Eva Apperson, thanks for watching!
@vinayakkatti40283 жыл бұрын
Very useful information. Thank you sir...
@DotNetCoreCentral3 жыл бұрын
@Vinayak Katti, thanks for watching!
@ponvels4 жыл бұрын
username and password passed as json to get Token via authenticate may capture in fiddler and other tools. How the security of data is ensured if web api need serve in internet ?
@DotNetCoreCentral4 жыл бұрын
@Ponvel Shanmuganathan, the API should be running on HTTPS to avoid this.
@ponvels4 жыл бұрын
@@DotNetCoreCentral Thanks for quick reply. I have deployed the sample code in my UAT server that get exposed on the internet via the public IP over https. I am still able to capture the Authorization : Bearer xxxxx data via fiddler. Let me clear my expectation. All the web api call after getting JWT token should not get exposed in any form. Even if we have 1 or 2 min expiration, until that time attacker can use the the captured token to reuse unauthorized.
@DotNetCoreCentral4 жыл бұрын
@@ponvels from local PC where the browser is running, the traffic can always be captured, the SSL is for stopping hackers from accessing data in the way. If your scenario when the user is logging in someone else is running Fiddler in the same machine at the time, I am not sure how practical this use case is. And if your concern is that the user leaves the website open on a public computer and someone comes in and tries to open the already open session in the web application, in that case, they already have the UI open, so the token is immaterial at this point. They can anyway access anything through UI. I am personally not aware of any mechanism to achieve what you want. If your use case is later, meaning the user leaves the UI in a public computer, the best solution is to add a log out strategy in the web application based on timeout.
@ponvels3 жыл бұрын
@@DotNetCoreCentral Hi - I am facing one more problem. after deploying this code in IIS. i am able to hit and get the result from the name controller via browser. Could you I tried adding another controller having same issue. please comment whether I am missing any thing.
@DotNetCoreCentral3 жыл бұрын
@@ponvels I am not sure I understood your problem. What happens when you add a new controller? What is the problem you are facing?
@rivaldovola98962 жыл бұрын
how to send the authentication header with each call. like what you did in postman?
@DotNetCoreCentral2 жыл бұрын
you set it in the header section of the Postman with Authorization header
@rivaldovola98962 жыл бұрын
@@DotNetCoreCentral sorry not what i meant to ask. How do I send the header with each call in my api. After i get my token out of my api login. How to I send that token with another call to get authorized?
@DotNetCoreCentral2 жыл бұрын
@@rivaldovola9896 Postman has concept of environment variable which you can use to save the token and pass it along to rest of the calls
@ghkpr3 жыл бұрын
Great tutorial, easy to follow and understand. Thanks a lot!
@DotNetCoreCentral3 жыл бұрын
@gh057k33p3r, thanks for watching the video!
@shashivishw8033 жыл бұрын
im getting 404 not found in get when im trying to get values1 and values 2
@DotNetCoreCentral3 жыл бұрын
@shashi vishw, if you can share your code in GitHub I can take a look, thanks.
@Ramesh_Kumar_TG3 жыл бұрын
how to validate bearer token - if you put post man bearer token its allow to hit the method i want to how to validate bearer token and the method
@DotNetCoreCentral3 жыл бұрын
@Ramesh Kumar, in the controller you will need to do this: if (!User.Identity.IsAuthenticated) return Unauthorized(); Rest will be taken care of by the middleware.
@Thegeektoendallgeeks4 жыл бұрын
why is making the IJwtAuthenticationManager necessary?
@DotNetCoreCentral4 жыл бұрын
@Thegeektoendallgeeks, thanks for watching! The JWTAuthenticationManager class is responsible for validating credentials and generate tokens. In a real-world scenario, this class might be just a proxy to an external authentication service for credentials validation, or it might interact with a data store for credentials. I hope this answers your question.
@Thegeektoendallgeeks4 жыл бұрын
@@DotNetCoreCentral that helps thank you, on a separate note. I have a asp.net core web app (MVC) with authentication individual user accounts project I want to add JWT authentication similar to this, but I can't seem to figure out where to start regarding getting the user credentials to apply all of this to.
@DotNetCoreCentral4 жыл бұрын
@@Thegeektoendallgeeks it should be the same as this demo since ASP.NET MVC also shares the same middleware pipeline as Web API. If you are facing any specific issue, and if you can share the code in GitHub, I can definitely take a look.
@mmsky4 жыл бұрын
Thank you so much for taking the time to make this video and share your knowledge! Excellent. Subscribed :)
@DotNetCoreCentral4 жыл бұрын
@Monica S, thanks for watching!
@ToTo-vx2ix4 жыл бұрын
can this jwt auth method used to verify access on controller page not controller api?
@DotNetCoreCentral4 жыл бұрын
@ToTo, yes it can be used anywhere since it is implemented in middleware.
@ToTo-vx2ix4 жыл бұрын
@@DotNetCoreCentral is it possible to give an example on how to access authorize controller page? im not sure on how to put the token to access it
@ToTo-vx2ix4 жыл бұрын
@@DotNetCoreCentral i already try to access api controller with token using postman and its work fine
@Uzair_Anwar22992 жыл бұрын
Hi. Good video. But what is the purpose of audience nd issuerence?
@pritamdeokule3 жыл бұрын
Thanks You. Great... very neat and clean explanation given by you.
@DotNetCoreCentral3 жыл бұрын
@Pritam Deokule, thanks for watching!
@iamsidthebest0073 жыл бұрын
Thanks for the video. I followed exactly like you said. The token expiry I set as : Expires = DateTime.UtcNow.AddMinutes(Convert.ToDouble("20")); So, as you see I have set 20 minutes. I submit Authenticate request -> I get access_token, thats great! Now, I submit other API request with this access_token as bearer, I get the response as expected. Now, after 20 minutes, I try hitting the same endpoint, I still get response, even though 20 minutes have passed already. What am I missing? Please help.
@DotNetCoreCentral3 жыл бұрын
@Sid N, thanks for watching. I will take a look and let you know.
@furkand2753 жыл бұрын
why do we need to "var tokenKey = Encoding.ASCII.GetBytes(key); "
@DotNetCoreCentral3 жыл бұрын
@Furkan D, thanks for watching! We need to pass byte array for the key, hence we need to get bytes from the string.
@jspalding704 жыл бұрын
Thank you for the knowledge you shared. What are the headers that I should be using with Postman?
@DotNetCoreCentral4 жыл бұрын
In header you have to put “bearer token”
@PraveenKumar-ft2kr4 жыл бұрын
Excellent video brother.. I have been looking for this.. Thank you so much 🙏🙌👏👏
@DotNetCoreCentral4 жыл бұрын
@Praveen Kumar, thanks for watching!
@furkand2753 жыл бұрын
"The name 'Encoding' does not exist in the current context" how to deal with it?
@DotNetCoreCentral3 жыл бұрын
@Furkan D, are you using the code as is? or you made some modifications? If you did, can you share your code in GitHub so I can take a look?
@furkand2753 жыл бұрын
@@DotNetCoreCentral i solved it thx anyway
@DotNetCoreCentral3 жыл бұрын
@@furkand275 glad it worked out!
@ashutoshmishra21703 жыл бұрын
i am big fan of your videos .
@DotNetCoreCentral3 жыл бұрын
@Ashutosh Mishra, thanks for watching!
@SohailKhan19813 жыл бұрын
Very well explained. Thanks for your effort.
@DotNetCoreCentral3 жыл бұрын
@Sohail Sarwar, thanks for watching!
@jashsudip3 жыл бұрын
really helpful to understand the jwt authentication. please make a video on refresh token also
@DotNetCoreCentral3 жыл бұрын
@Sudip Jash, thanks for watching. I already have a video on refresh token on my channel.
@nrldcm11333 жыл бұрын
How about updating the token expiration when user tends to log out?. can you help me with that code?
@DotNetCoreCentral3 жыл бұрын
@Norell Mantilla, I have a video on refresh token, you can refer to that and let me know if that works for you.
@pedromoura87314 жыл бұрын
Hi, thanks for the tutorial! You keep the content simple and easy wich is great, but for future improvement you could add a real front end, just a login page, 1 or 2 authorized pages and a logout. this way we could see the complete workflow of the jwt and how is stored in page transitions.
@DotNetCoreCentral4 жыл бұрын
Pedro Moura thanks for the suggestions. I’ll definitely work on that. Thanks again for watching the video.
@marrelicious67313 жыл бұрын
@@DotNetCoreCentral Did you ever make this video?
@lengoctuan52172 жыл бұрын
@@DotNetCoreCentral Did you ever make this video?
@DotNetCoreCentral2 жыл бұрын
@@lengoctuan5217 no, I never got to it.
@lengoctuan52172 жыл бұрын
@@DotNetCoreCentral Thanks brother for the reply. Your video is very helpful.
@ravindranaths5134 жыл бұрын
Hi, At timeline of 10:23 in this video, I have two questions here. 1) Why you used SecurityTokenDescriptor (from Microsoft.IdentityModel.Tokens); why not JwtSecurityToken (from System.IdentityModel.Tokens.Jwt)? 2) What is the difference between Microsoft.IdentityModel.Tokens.SecurityTokenDescriptor and System.IdentityModel.Tokens.Jwt.JwtSecurityToken classes? When to use which?.
@DotNetCoreCentral4 жыл бұрын
@Ravindranath S, JwtSecurityTokenHandler expects SecurityTokenDescriptor from Microsoft.IdentityModel.Tokens, hence. You can use JwtSecurityToken to create token, in that case, you will need to call WriteToken, instead of CreateToken on the JwtSecurityTokenHandler instance.
@sps0143 жыл бұрын
Great video, nicely explained
@DotNetCoreCentral3 жыл бұрын
@Shivendra P. Singh, thanks for watching!
@brettgregory36223 жыл бұрын
Amazing video thank you! So clear and concise!
@DotNetCoreCentral3 жыл бұрын
@Brett Gregory, thanks for watching!
@inmywaythings2 жыл бұрын
Simple and clear example, thank you 👍
@DotNetCoreCentral2 жыл бұрын
Thanks for watching!
@alibux4 жыл бұрын
Thank you for this very helpful video and sharing your knowledge! Subscribed!
@DotNetCoreCentral4 жыл бұрын
@Rehan Alibux, thanks for watching the video and subscribing to my channel!
@cheequsharma7391 Жыл бұрын
Thanks a lot for such content. I respect and really admire your huge efforts, for such incredible content. God bless mate.
@DotNetCoreCentral Жыл бұрын
Thanks a ton
@jvvable3 жыл бұрын
Thanks for your video, a Very Good explanation. I have a suggestion. if you can list out all the dependencies that will be great.
@DotNetCoreCentral3 жыл бұрын
@jvv (vvj), thanks for watching and the suggestion!
@stephenviswaraj74634 жыл бұрын
Excellent Show, thanks much.
@DotNetCoreCentral4 жыл бұрын
@Stephen Viswaraj, thanks for watching!
@knightmarerip7113 жыл бұрын
Excellent work explaining this!
@DotNetCoreCentral3 жыл бұрын
@Knightmare RIP, thanks for watching!
@rishukumar75862 жыл бұрын
which the best place to store that private key?
@DotNetCoreCentral2 жыл бұрын
Normally I use the AWS Secret server, most of the cloud providers will have something similar.
@eryogeshtripathi88883 жыл бұрын
Nice and simple video
@DotNetCoreCentral3 жыл бұрын
@Yogesh Tripathi, thanks for watching!
@gautamsaraswat15414 жыл бұрын
Great video. Keep doing the good work
@DotNetCoreCentral4 жыл бұрын
Gautam Saraswat thanks for watching!
@hindachokri54633 жыл бұрын
Thank you for this helpful video. Keep doing the good work.
@DotNetCoreCentral3 жыл бұрын
@Hinda Chokri, thanks for watching and taking the time to provide a comment!
@mrjamiebowman3 жыл бұрын
This is great and I was able to replicate this. However, I'm wondering.. where do refresh tokens come into play?
@DotNetCoreCentral3 жыл бұрын
@Jamie Bowman, refresh token comes to play when as an app you want to extend the token lifetime of the user without asking the user to enter id/pwd again for a new token after the initial token expired. The classic example will be a mobile application.
@kadavilk3 жыл бұрын
Great video brother. If you could explain why we are using each commend and its benefits would have been really helpful.
@DotNetCoreCentral3 жыл бұрын
@Kishor Kadavil, thanks for watching and great feedback, I will work on this.
@mahipala19523 жыл бұрын
How to make jwt taken invalid on logout time??
@DotNetCoreCentral3 жыл бұрын
@mahipal a, you can create a block list, and the tokens that are part of the block list will not be allowed.
@nafeeskhan82493 жыл бұрын
Can you please provide the second part of this tutorial. It is very nice video. Awesome.
@DotNetCoreCentral3 жыл бұрын
@Nafees Khan, thanks for watching! What are you expecting in the second part?
@sri38842 жыл бұрын
Great content 👏👏 , Thank you
@Whisper_Jonas3 жыл бұрын
Thank you for all of your tutorial
@DotNetCoreCentral3 жыл бұрын
@Monsieur Bobel, thanks for watching!
@priyanshu40163 жыл бұрын
Great video, i request you to explain the token validation parameter , and token descriptor class properties significance and what situation what value we should set may help great if you do some short video on that portion
@DotNetCoreCentral3 жыл бұрын
@Web Samurai, thanks for watching, I will try to do a video for that.
@namburinaveen54923 жыл бұрын
Hi bro can you make a video on how to renew the expired token when user is in actively using webapi and web application
@DotNetCoreCentral3 жыл бұрын
@namburi naveen, thanks for watching. I can do that.
@rakshitkumar48383 жыл бұрын
How can i consume it in my mvc application??
@DotNetCoreCentral3 жыл бұрын
@Rakshit Kumar, if you are using ASP.NET Core AMV it should be exactly the same as Web API
@AjithChanaka4 жыл бұрын
Thank you for making it easy understanding.
@DotNetCoreCentral4 жыл бұрын
@Ajith Chanaka, thanks for watching!
@rdoskoch3 жыл бұрын
So satisfying keyboard typing.))))
@DotNetCoreCentral3 жыл бұрын
@Roman Doskoch, thanks!
@shsikzuhair43933 жыл бұрын
Thanks....good explanation
@DotNetCoreCentral3 жыл бұрын
@Shsik zuhair, thanks!
@aditisen202 жыл бұрын
very well explained
@DotNetCoreCentral2 жыл бұрын
Thanks!
@codewithsakti819711 ай бұрын
Thanks . Perfect video
@DotNetCoreCentral10 ай бұрын
You're welcome!
@SoftwareMahima20243 жыл бұрын
Very good video
@DotNetCoreCentral3 жыл бұрын
@Raj Raj, thanks for watching!
@georgetuccio60532 жыл бұрын
Very nicely done. Thank you.
@akremhammami53283 жыл бұрын
I still get 401 even I pass the token
@rahulmathew87133 жыл бұрын
Awesome keep up the good work
@DotNetCoreCentral3 жыл бұрын
@Rahul Mathew, thanks for watching!
@abdullahhafeez77983 жыл бұрын
where is the code link??
@DotNetCoreCentral3 жыл бұрын
github.com/choudhurynirjhar/auth-demo
@majichayan4 жыл бұрын
Thank you for your well explained video. If possible, could you please make another video to show, secure an api with azure active directory and consume it from AAD secured react app.
@DotNetCoreCentral4 жыл бұрын
majichayan I’ll definitely try. Thanks for the suggestion and thanks for watching.
@jeffbreuninger70364 жыл бұрын
Thank you! Very helpful tutorial.
@DotNetCoreCentral4 жыл бұрын
@Jeff Breuninger thanks for watching!
@nileshmonde48793 жыл бұрын
Nice one ... can we apply same for MVC 5
@DotNetCoreCentral3 жыл бұрын
@nilesh monde, yes, you can. Thanks!
@gabriel99999-r4 жыл бұрын
Can you do a playlist of these series please ?
@DotNetCoreCentral4 жыл бұрын
Gabriel Luca I will surely do. Thanks for watching.
@gabriel99999-r4 жыл бұрын
@@DotNetCoreCentral great. Will you also add api versioning ?
@DotNetCoreCentral4 жыл бұрын
Gabriel Luca I’m sorry for late response. For some reason I did not get any notification. I’ll definitely do a video on API versioning.
@iyashasgowda4 жыл бұрын
A heartly thanks to you for teaching the tokenization in simple way.
@DotNetCoreCentral4 жыл бұрын
@Yashas Gowda, thanks for watching!
@sachindeshmukh55323 жыл бұрын
Thank you so much for this video! it's really helpful..
@DotNetCoreCentral3 жыл бұрын
@sachin deshmukh, thanks for watching!
@alihaydar30213 жыл бұрын
Good job 👍 .. what about refresh token?
@DotNetCoreCentral3 жыл бұрын
@ Ali Haydar, thanks for watching! kzbin.info/www/bejne/bXuzaIlrbr1kqc0
@bramburn4 жыл бұрын
Can you explain the claims please?
@DotNetCoreCentral4 жыл бұрын
@Bhavesh Ramburn, claim is exactly what the name suggests. It's the claims asserted about the user. And if the user is authenticated the asserted claims are added to the ClaimsIdentity for the application to use.
@ItianNerona3 жыл бұрын
Claims is just information about the client that is added to the token. It helps identify which user the token is for, among other things. In the RFC for JWT by IETF, they stated that "JWT parsers MUST either reject JWTs with duplicate Claim Names or use a JSON parser that returns only the lexically last duplicate member name" (tools.ietf.org/html/rfc7519#section-15.12).
@marcotaliente47853 жыл бұрын
Thank you man, that is what i sought for
@DotNetCoreCentral3 жыл бұрын
@Marco Taliente, thanks for watching, and glad this video helped you!
@SaravanaKumar-bt5xn4 жыл бұрын
Thanks for the tutorial. You are explaining the concepts very well. Could you please give some suggestions on this? What are the ways to store a JWT token securely on client side. We can use cookies or local storage. But, however someone/ anonymous will able to see the token by using some debugging tools and they can mock the same request and use it in outside of the application. How we can avoid it? Thanks.
@DotNetCoreCentral4 жыл бұрын
Saravana Kumar I’m afraid there is not many choices for storing token securely on client side. Your best bet is local storage. But in terms of avoiding security threats keep your token expiry shorter. So that even if it’s stolen it cannot be used for a longer period.
@SaravanaKumar-bt5xn4 жыл бұрын
@@DotNetCoreCentral Thank you so much for replying me. Will we use refresh token to overcome this issue?