Sign in to confirm you’re not a bot
This helps protect our community. Learn more

Intro

0:00

Review Part 1 & 2

0:36

Overview

0:50

Register Okta dev account

1:56

Create new app at Okta

2:55

Adding Okta to startup.cs

4:50

Testing Okta in our app

8:00

Error - add user to app in Okta dashboard

8:25

Permission denied - missing admin role

9:37

Using Okta groups for role assignment

12:00

Summarizing Okta

17:00

Adding multiple login providers

17:20

Making the login providers generic

19:46

Testing multiple providers

22:47

Problem with logout

23:40

Capture login scheme with events

24:44

Trying the Cookie Auth Events instead

26:06

Adding .AuthScheme as claim

32:08

Fix logout problem

33:06

Adding SignedOutCallbackPath in startup

35:41

Register callback path at Okta dashboard

36:55

Setting Scope properties in OIDC

38:45

Why use IDaaS?

39:53

Using database to capture and register users from social login providers

40:38

Database magically appears in project

41:47

Adding UserService.cs

42:04

Connect UserService in HomeController, TryValidateUser

48:32

Error: Unable to resolve UserService

50:12

Register UserService in DependencyInjection in Startup.cs

50:28

Getting user role from the database

51:26

Create add new user method

54:52

Writing extension method to ease getting claims properties

56:05

Connecting add new user method to Cookie Auth Event

58:58

Testing the add user method

1:01:26

Okta and the missing first & last name fields

1:03:01

Final Thoughts

1:05:35
ASP.NET Core 5.0 - Authentication Part 3 IDaaS (Okta) & Multiple Login Providers
433Likes
23,163Views
2021Apr 12
In part 3 of our Authentication in ASP.NET Core 5.0 (6.0 full API/MVC also) series, we examine the IDaaS (Identity as a Service) specifically Okta and we implement multiple social login providers to let our user decide which provider they would like to use to login to our site. Authentication in ASP.NET Core 5.0 series: https://mobiletonster.com/area/code - website with companion articles & code PART 1 - (Authentication/Authorization & Cookies) -    • ASP.NET Core 5.0 - Authentication/Authoriz...   PART 2 - (this video) -    • ASP.NET Core 5.0 - Authentication  Part 2:...   PART 3 - (IDaaS & Multiple Providers) -    • ASP.NET Core 5.0 - Authentication Part 3 I...   PART 3a - (Connect SQLite DB) -    • Add Sqlite database using EF Core code-fir...   Chapters 0:00 Intro 0:36 Review Part 1 & 2 0:50 Overview 1:56 Register Okta dev account 2:55 Create new app at Okta 4:50 Adding Okta to startup.cs 8:00 Testing Okta in our app 8:25 Error - add user to app in Okta dashboard 9:37 Permission denied - missing admin role 12:00 Using Okta groups for role assignment 17:00 Summarizing Okta 17:20 Adding multiple login providers 19:46 Making the login providers generic 22:47 Testing multiple providers 23:40 Problem with logout 24:44 Capture login scheme with events 26:06 Trying the Cookie Auth Events instead 32:08 Adding .AuthScheme as claim 33:06 Fix logout problem 35:41 Adding SignedOutCallbackPath in startup 36:55 Register callback path at Okta dashboard 38:45 Setting Scope properties in OIDC 39:53 Why use IDaaS? 40:38 Using database to capture and register users from social login providers 41:47 Database magically appears in project 42:04 Adding UserService.cs 48:32 Connect UserService in HomeController, TryValidateUser 50:12 Error: Unable to resolve UserService 50:28 Register UserService in DependencyInjection in Startup.cs 51:26 Getting user role from the database 54:52 Create add new user method 56:05 Writing extension method to ease getting claims properties 58:58 Connecting add new user method to Cookie Auth Event 1:01:26 Testing the add user method 1:03:01 Okta and the missing first & last name fields 1:05:35 Final Thoughts Intro includes music: Spend My Time With You (Electro Swiremng Remix) - 11 Acorn Lane http://www.11acornlane.com    • Electro Swing | 11 Acorn Lane - Spend My T...  

Follow along using the transcript.

Tony “mobiletonster” Spencer

3.64K subscribers