Slide 5
Slide 5 text
Authentication vs Authorization
Authentication
Identify authentication information in the request, use the configured
methods to read it and create an instance of ClaimsPrincipal with the
ClaimsIdentity and Claims of the requester
Authorization
Based on the requester Claims, the resource state, and potentially
other information, allow or disallow action execution or filter resource
information