This course will be retired on July 14, 2025.
Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Well done!
You have completed User Authentication with ASP.NET Identity!
Preview
Video Player
00:00
00:00
00:00
- 2x 2x
- 1.75x 1.75x
- 1.5x 1.5x
- 1.25x 1.25x
- 1.1x 1.1x
- 1x 1x
- 0.75x 0.75x
- 0.5x 0.5x
Now that we've got a way for users to register and sign-in, we're going to tackle another important issue: segmenting and protecting our user's data.
This video doesn't have any notes.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
[MUSIC]
0:00
Now that we've got a way for
users to register and sign in,
0:04
we're going to tackle
another important issue.
0:07
Segmenting and protecting our users data.
0:11
The Fitness Frog Web app,
tracks a users fitness activities.
0:14
Unfortunately, the fitness activity
entry stored in our database
0:18
are associated with a specific user.
0:22
So we currently don't have a way to know
which entries belong to which users.
0:24
We need to take our existing data and
segment it so
0:30
that each entry will belong to or
be associated with a single user.
0:33
Going a step further, we need to make some
updates to our web app in order to protect
0:37
our users' data, so that a user can
access and modify only their own data.
0:42
The changes that we'll make in this
section won't visually change the user
0:48
interface of our application at all.
0:52
But when we're done,
we'll be able to sign in and
0:54
see a list of just of our own
entries on the entries list page.
0:59
And in a new entries that we add, we'll
also be associated with our user account.
1:03
In this section., we'll start with
segmenting our entries data by user.
1:10
Then we'll update
the database seed data so
1:14
that each entry is associated
with a specific user.
1:16
After that,
we'll update the entries repository and
1:20
"Entries" list page to work
with our updated data model.
1:23
Then we'll make the changes that'll
be necessary in order to protect our
1:27
user's data.
1:30
And we'll finish up this
section by taking a look
1:31
at securing communication between
the client and server using SSL.
1:34
And how to prevent a common security
attack vector known as CSRF, or
1:38
cross site request forgery.
1:43
In the next step,
let´s review our data model and
1:45
make the necessary changes
to segment our data by user.
1:48
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up