~Get Your Files Here !/02/demos/end/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/02/demos/start/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/03/demos/end/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/03/demos/start/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/04/demos/end/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/04/demos/start/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/05/demos/end/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/05/demos/start/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/06/demos/end/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/06/demos/start/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/07/demos/end/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/07/demos/start/GloboTicket.Services.ShoppingBasket/Migrations/20200711083614_Events.cs1.69KB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp43.39MB
~Get Your Files Here !/2. Securing Your First Microservice/1. Coming Up.mp41.86MB
~Get Your Files Here !/2. Securing Your First Microservice/10. Demo - Accessing a Microservice on Behalf of the Client Application.mp439.95MB
~Get Your Files Here !/2. Securing Your First Microservice/11. Using the Identity Microservice to Log In.mp43.39MB
~Get Your Files Here !/2. Securing Your First Microservice/12. Demo - Using the Identity Microservice to Log In.mp458.7MB
~Get Your Files Here !/2. Securing Your First Microservice/13. Demo - Logging Out.mp411.98MB
~Get Your Files Here !/2. Securing Your First Microservice/14. Accessing a Microservice on Behalf of the User.mp42.3MB
~Get Your Files Here !/2. Securing Your First Microservice/15. Demo - Accessing a Microservice on Behalf of the User.mp433.82MB
~Get Your Files Here !/2. Securing Your First Microservice/16. Summary.mp42.64MB
~Get Your Files Here !/2. Securing Your First Microservice/2. Course Prerequisites.mp41.95MB
~Get Your Files Here !/2. Securing Your First Microservice/3. Frameworks and Tooling.mp42.51MB
~Get Your Files Here !/2. Securing Your First Microservice/4. Inspecting the GloboTicket Demo Application.mp44.48MB
~Get Your Files Here !/2. Securing Your First Microservice/5. Demo - Getting Started with the Globoticket Demo Application.mp414.42MB
~Get Your Files Here !/2. Securing Your First Microservice/6. Token-based Security for Microservices.mp410.62MB
~Get Your Files Here !/2. Securing Your First Microservice/7. Demo - Inspecting an Identity Service.mp422.7MB
~Get Your Files Here !/2. Securing Your First Microservice/8. Accessing a Microservice on Behalf of the Client Application.mp42.95MB
~Get Your Files Here !/2. Securing Your First Microservice/9. Demo - Blocking Access to a Microservice.mp422.07MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/1. Coming Up.mp41.11MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/10. Demo - Service to Service Communication on Behal.mp435.51MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/11. Further Improvements.mp43.44MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/12. Summary.mp41.45MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/2. The Problems with “One Token to Rule Them All”.mp45.39MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/3. Demo - Tightening Access with One Audience per Mi.mp422.22MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/4. Comparing Security Scenarios.mp45.25MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/5. Authorization with Scopes Inside of a Microservic.mp42.24MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/6. Demo - Authorization with Scopes Inside of a Micr.mp423.42MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/7. Downstream Service to Service Communication on Be.mp43.27MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/8. Supporting Token Exchange.mp44.58MB
~Get Your Files Here !/3. Improving Your Security with Service to Service and Token Exchange Patterns/9. Demo - Adding Support for the Token Exchange Gran.mp427.59MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/1. Coming Up.mp4966.34KB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/10. Summary.mp43.57MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/2. Exploring the API Gateway.mp42.82MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/3. A Common API Gateway Security Pattern.mp42.71MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/4. Introducing Ocelot.mp44.99MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/5. Demo - Adding Ocelot.mp427.17MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/6. Demo - Integrating Ocelot with Our Identity Service.mp430.35MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/7. Passing User Information to a Microservice.mp45.63MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/8. Demo - Passing User Information to a Microservice.mp427.01MB
~Get Your Files Here !/4. Implementing Security with API Gateway and BFF Patterns/9. The Backend-for-frontend Pattern.mp43.31MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/1. Coming Up.mp4735.65KB
~Get Your Files Here !/5. Improving the API Gateway Pattern/2. Improving the API Gateway Pattern (Part 1).mp46.45MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/3. Demo - Making Microservices Responsible for Validating Incoming Tokens.mp425.61MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/4. Demo - Configuring the Gateway for Scope-based Microservice Access Authorization.mp450.24MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/5. Improving the API Gateway Pattern (Part 2).mp43.16MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/6. Demo - Making the Gateway Responsible for Exchanging Tokens.mp453.29MB
~Get Your Files Here !/5. Improving the API Gateway Pattern/7. Summary.mp41.2MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/1. Coming Up.mp41.09MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/2. Learning About Token Expiration.mp44.18MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/3. Demo - Refreshing Tokens with IdentityModel.AspNetCore.mp421.28MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/4. Refreshing and Storing Tokens When Flows Are Not Initiated by the User.mp43.67MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/5. Demo - Adding Token Store Support for Custom Flows.mp429.18MB
~Get Your Files Here !/6. Enabling Long-lived Access and Token Stores/6. Summary.mp41.82MB
~Get Your Files Here !/7. Securing Async Service Communication/1. Coming Up.mp4926.49KB
~Get Your Files Here !/7. Securing Async Service Communication/2. Approaches to Service Bus Security.mp45.12MB
~Get Your Files Here !/7. Securing Async Service Communication/3. Introducing the Upcoming Demos.mp42.3MB
~Get Your Files Here !/7. Securing Async Service Communication/4. Demo - Requesting a Token.mp424.53MB
~Get Your Files Here !/7. Securing Async Service Communication/5. Demo - Sending and Validating a Token.mp452MB
~Get Your Files Here !/7. Securing Async Service Communication/6. Dealing with Token Expiration.mp44.81MB
~Get Your Files Here !/7. Securing Async Service Communication/7. Demo - Dealing with Token Expiration.mp420.49MB
~Get Your Files Here !/7. Securing Async Service Communication/8. Choosing the Right Security Approach for Your Use Case.mp45.01MB
~Get Your Files Here !/7. Securing Async Service Communication/9. Summary.mp42.32MB