Updated 11/25/2020 00:40
Demonstrates the implementation of Cookie Authentication. The first article of a series for Users Without Identity.
Updated 11/25/2020 00:38
Demonstrates the implementation of storing a user entity in a MS SQL database. The second article of a series for Users Without Identity.
Updated 11/25/2020 00:34
Demonstrates the implementation of an admin role to manage users. The fifth article of a series for Uses Without Identity.
Updated 11/25/2020 00:33
Demonstrates the implementation of verifying the authentication cookie on every request. The sixth article of a series for Uses Without Identity.
Updated 11/25/2020 00:29
Demonstrates the implementation of a must change password custom claim which uses middleware to redirect the user to a change password page. The eighth article of a series for Uses Without Identity.
Updated 11/25/2020 00:26
Introduces a series about implementing two-factor authentication without ASP.NET Core Identity. The first article of a series for 2FA Without Identity.
Updated 11/25/2020 00:17
Describes the implementation of a class for functions PasswordSignInAsync, SignOut, RefreshSignIn, and functions which remember and forget the current 2FA browser. The fifth article of a series for 2FA Without Identity.
Updated 11/25/2020 00:11
Describes how to implement a policy and a custom 2FA enabled claim to deny access to admin pages for administrators who have not enabled 2FA. The seventh article of a series for 2FA Without Identity.
Updated 08/04/2020 03:32
Describes how to implement ASP.NET Core Identity's external logins.
Updated 08/04/2020 02:54
Describes how to implement middleware which will redirect authenticated users to a Terms of Service page until they agree.
I write about the difficulties and methods I have found while developing this site with ASP.NET Core 2.2,
upgrading to ASP.NET Core 3.1 and EntityFramework Core. None of the authors, contributors, or anyone
else connected with KenHaggerty.Com, in any way whatsoever, can be responsible for your use of the
information contained in or linked from these articles.
These articles are a way of contributing to the open source communities which have brought about many advanced
methods of software development. The rapid change of these technologies usually leaves the documentation
outdated and sometimes non-existent. All articles will have created and last updated dates. I will do my best to update
any article which I learn to be inaccurate. The research comes from articles and posts on sites like stackoverflow,
docs.microsoft.com and GitHub. I hardly ever find my solution from one article or post. I give references in the article
to the most pertinent sources. There is a comments feature to allow open discussion. If you have concerns and do not
want to register, please send me an email.