Book Image

A Developer's Guide to .NET in Azure

By : Anuraj Parameswaran, Tamir Al Balkhi
Book Image

A Developer's Guide to .NET in Azure

By: Anuraj Parameswaran, Tamir Al Balkhi

Overview of this book

A Developer’s Guide to .NET in Azure helps you embark on a transformative journey through Microsoft Azure that is tailored to .NET developers. This book is a curated compendium that’ll enable you to master the creation of resilient, scalable, and highly available applications. The book is divided into four parts, with Part 1 demystifying Azure for you and emphasizing the portal's utility and seamless integration. The chapters in this section help you configure your workspace for optimal Azure synergy. You’ll then move on to Part 2, where you’ll explore serverless computing, microservices, containerization, Dapr, and Azure Kubernetes Service for scalability, and build pragmatic, cost-effective applications using Azure Functions and Container apps. Part 3 delves into data and storage, showing you how to utilize Azure Blob Storage for unstructured data, Azure SQL Database for structured data, and Azure Cosmos DB for document-oriented data. The final part teaches you about messaging and security, utilizing Azure App Configuration, Event Hubs, Service Bus, Key Vault, and Azure AD B2C for robust, secure applications. By the end of this book, you’ll have mastered Azure's responsive infrastructure for exceptional applications.
Table of Contents (20 chapters)
1
Part 1: An Introduction to Your Environment
3
Part 2: Serverless and Microservices
8
Part 3: Data and Storage
12
Part 4: Messaging Mechanisms and Security

Different types of tokens

In this section, we selected an option to choose both the ID token and access token. In authentication and authorization systems, there are three main types of tokens we need to know about:

  • Access token: This is a short-lived credential granted to an application after a user successfully logs in. It authorizes the app to access specific resources, such as APIs or services, on behalf of the user. Access tokens are used to make secure requests to these resources, ensuring that only authorized applications can access them.
  • ID token: Often used in OIDC, an ID token contains information about the authenticated user, such as their name and email address. It helps verify the user’s identity and is used in single sign-on scenarios, providing user profile data to applications.
  • Refresh token: Refresh tokens are long-lived and used to obtain new access tokens once the original one expires. They enable seamless and secure access for extended periods...