Authentication

Since the origin of the World Wide Web, the vast majority of authentication techniques rely upon HTTP/HTTPS implementation standards, and all of them work more or less in the following way:

  1. A non-authenticated user-agent asks for a content that cannot be accessed without some kind of permissions.
  2. The web application returns an authentication request, usually in form of an HTML page containing an empty web form to complete.
  3. The user-agent fills up the web form with their credentials, usually a username and a password, and then sends it back with a POST command, which is most likely issued by a click on a Submit button.
  4. The web application receives the POST data and calls the aforementioned server-side implementation that will try to ...

Get ASP.NET Core: Cloud-ready, Enterprise Web Application Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.