HOUR 21Granting Access to Users
What You’ll Learn in This Hour:
How to configure authorization for your application
How to construct authorization policies
How to write more complex custom authorization requirements
Once you have authenticated users to your application, you know who they are. To complete the picture of securing your application from unauthorized users, you need to write some code to verify that your users have been granted access. ...