Book Image

Hands-On Full-Stack Web Development with ASP.NET Core

By : Tamir Dresher, Amir Zuker, Shay Friedman
Book Image

Hands-On Full-Stack Web Development with ASP.NET Core

By: Tamir Dresher, Amir Zuker, Shay Friedman

Overview of this book

Today, full-stack development is the name of the game. Developers who can build complete solutions, including both backend and frontend products, are in great demand in the industry, hence being able to do so a desirable skill. However, embarking on the path to becoming a modern full-stack developer can be overwhelmingly difficult, so the key purpose of this book is to simplify and ease the process. This comprehensive guide will take you through the journey of becoming a full-stack developer in the realm of the web and .NET. It begins by implementing data-oriented RESTful APIs, leveraging ASP.NET Core and Entity Framework. Afterward, it describes the web development field, including its history and future horizons. Then, you’ll build webbased Single-Page Applications (SPAs) by learning about numerous popular technologies, namely TypeScript, Angular, React, and Vue. After that, you’ll learn about additional related concerns involving deployment, hosting, and monitoring by leveraging the cloud; specifically, Azure. By the end of this book, you’ll be able to build, deploy, and monitor cloud-based, data-oriented, RESTful APIs, as well as modern web apps, using the most popular frameworks and technologies.
Table of Contents (22 chapters)
Title Page
PacktPub.com
Contributors
Preface
Index

Authenticating and authorizing application users


Many web applications allow users to perform certain operations only if they are registered, and some applications will only allow paid users to view certain content that is not available to non-paying users. Also, as a user, you expect that your personal profile will be editable only by you, and not by other users, unless they are the site administrators. All the scenarios I have detailed here are examples of authentication and authorization. 

Authentication is the act of knowing who the user is and verifying their identity, while authorization is the act of allowing or preventing users from performing actions based on their privileges. 

 

The security technique for authentication that we will use in this book is called token-based authentication.This technique involves generating a security token (a hashed string) when the user logs in, and carrying this token with each request the client makes to the server. This technique is highly used in...