In the previous chapter, I focused on the ASP.NET Core request pipeline and the middleware components that authenticate requests and authorize access to endpoints. In this chapter, I dig deeper into the authorization features, explaining the different ways that access can be restricted. These are, once again, features that are provided by ASP.NET Core, and I describe them without using ASP.NET Core Identity. Table
15-1 puts the ASP.NET Core authorization features in context.
Table 15-1.Putting Request Authorization in Context ...