1.6 Resource-based authorization In the previous two articles, we became familiar with the five authorization methods (the policy authorization mentioned in the previous article and the custom authorization policy provider of IAuthorizationPolicyProvider were not discussed, and will be added later). The authorization method mentioned in this article is not a new authorization method, but a […]
Tag: identity
asp.net core series 47 Identity custom user data
1. Overview Following the WebAppIdentityDemo project in the previous article, add custom user data to Identity DB. The user data class of custom extension should inherit the IdentityUser class, and the file name is Areas/Identity/Data/{project name}User.cs. Customized user data model attributes need to be modified with [PersonalData] for automatic download and deletion. Enabling data to […]
asp.net core series 48 Identity identity model customization
1. Overview ASP.NET Core Identity provides a framework for managing and storing user accounts in ASP.NET Core applications. Individual user accounts are selected as the authentication mechanism when Identity is added to a project. By default, Identity can use the Entity Framework (EF) Core data model. This article describes how to customize the identity model. […]
asp.net core series 50 Identity authorization (medium)
1.5 Policy-Based Authorization In the previous article, we have already talked about the four methods of authorized access (authorization). Among them, Razor Pages authorization agreement and simple authorization are more like authentication, because as long as a legitimate user logs in, he can access resources. The two methods of role authorization and statement authorization are […]
asp.net core series 49 Identity authorization (on)
1. Overview Authorization refers to the user’s permission to access resources, such as viewing, editing, adding, deleting, exporting, and downloading of page data. ASP.NET Core authorization provides multiple and flexible methods, including: Razor pages authorization convention, simple authorization, Role authorization, Claim authorization, Policy policy authorization, resource authorization, and view authorization. 1.1 Razor pages agreement authorization […]
IAM upgrade Identity and Access Management (MVC)
Directory First let’s look at how to integrate first step: Step two: third step: the fourth step: Problems encountered during project upgrade First of all, detailed introductions to IAM are everywhere on the Internet. I will not elaborate here one by one. You can learn from some articles. For example: Zero Trust: From IAM Overview […]
Apple three-party login, verify identityToken method, golang server processing
Apple login, verify identityToken method Overview Apple returns the user ID, authorizationCode and identityToken after authorized login, where: authorizationCode corresponds to a verification method that interacts with the Apple server. Domestic three-party logins, such as WeChat logins, are all such verification methods, but this article does not cover them. identityToken uses the public key obtained […]
11-matrix (matrix)_square matrix_symmetrical matrix_identity matrix_diagonal matrix
Matrix Vector is an extension of logarithm, a vector represents a set of numbers A matrix is an extension of a vector, and a matrix represents a set of vectors ( 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ) \begin{pmatrix} 1 & amp; 2 & amp; […]
Implement WebSocket and user identity verification with Netty based on Springboot
Speaking at the beginning, the text mainly refers to: SpringBoot + WebSocket + Netty to achieve message push Life cycle of Netty-11-channelHandler springboot integration netty guide north First you need to understand the life cycle of channel establishment The order of ChannelHandler is as follows: handlerAdded() –> channelRegistered() –> channelActive() –> channelRead() –> channelReadComplete() Note […]
2023 latest version Activiti7 series – identity service
Identity Services In the process definition, the task leader is fixed in the assignee of the task node, and the participants are fixed in the .bpmn file when the process is defined. If the temporary task leader changes, the process definition needs to be modified, and the system has poor scalability. For this situation, multiple […]