Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Real-World Web Development with .NET 9
  • Toc
  • feedback
Real-World Web Development with .NET 9

Real-World Web Development with .NET 9

By : Mark J. Price
3.5 (4)
close
Real-World Web Development with .NET 9

Real-World Web Development with .NET 9

3.5 (4)
By: Mark J. Price

Overview of this book

Real-World Web Development with .NET 9 equips you to build professional websites and services using proven technologies like ASP.NET Core MVC, Web API, and OData—trusted by organizations for delivering robust web applications. You’ll learn to design and build efficient web applications with ASP.NET Core MVC, creating well-structured, maintainable code that follows industry best practices. From there, you'll dive into Web API, mastering how to build RESTful services that are both secure and scalable. Along the way, you’ll also explore testing, authentication, containerization for deployment, ensuring that your solutions are fully production-ready. In the final part of the book, you will be introduced to Umbraco CMS, a popular content management system for .NET. By mastering this tool, you’ll learn how to empower users to manage website content independently. By the end of this book, you'll not only have a solid grasp of controller-based development but also the practical know-how to build dynamic, content-driven websites using a popular .NET CMS.
Table of Contents (16 chapters)
close
Free Chapter
1
Real-World Web Development with .NET 9: Build websites and services using mature and proven ASP.NET Core MVC, Web API, and Umbraco CMS

Introducing authentication and authorization

Authentication and authorization are two concepts in web application security, often used together but with distinct purposes, as described in the following list:

  • Authentication aka “who are you?” This is the process of verifying the identity of a user. When a user attempts to log in to an application, the system checks whether the credentials, for example, username and password, provided by the user match those stored in the system. Successful authentication confirms that the user is who they claim to be. Once authentication has occurred, a system often provides the client with a token that the client can submit with future requests to avoid having to re-authenticate each time. These tokens can be HTTP cookies, JSON, or some other format like JWT (JSON Web Tokens) that can encapsulate additional claims.
  • Authorization aka “what can you do?” Once the user is authenticated, authorization determines what resources...
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete