Book Image

Mastering Blazor WebAssembly

By : Ahmad Mozaffar
3.5 (2)
Book Image

Mastering Blazor WebAssembly

3.5 (2)
By: Ahmad Mozaffar

Overview of this book

Blazor WebAssembly is a revolutionary technology in software development that enables you to develop web applications with a rich user interface using C# without JavaScript. It can be run natively in the browser and soon on mobile apps with .NET MAUI, making it a superweapon in the .NET developer’s toolbox. This capability has opened the doors for the JavaScript community to have a stable framework to build single page applications (SPAs) maintained by Microsoft and driven by the community. Mastering Blazor WebAssembly is a complete resource that teaches you everything you need to build client-side web applications using C# & .NET 7.0. Throughout this book, you’ll discover the anatomy of a Blazor WebAssembly project, along with the build, style, and structure of the components. You’ll implement forms to catch user input and collect data, as well as explore the topics of navigating between the pages in depth. The chapters will guide you through handling complex scenarios like RenderTrees, writing efficient unit tests, using variant security methods, and publishing the app to different providers, all in a practical manner. By the end of this book, you’ll have the skills necessary to build web apps with Blazor WebAssembly, along with the basics for a future in mobile development with .NET MAUI and Blazor.
Table of Contents (21 chapters)
1
Part 1: Blazor WebAssembly Essentials
5
Part 2: App Parts and Features
13
Part 3: Optimization and Deployment

Accessing authorized API endpoints

In the API of BooksStore, or any APIs you are working with, either some or all the endpoints will be secured and will require an authorized user with the right roles and permissions. In this book, we are looking at web APIs from the client’s perspective, so we are not going to explain how the API authentication system works internally. The API documentation should tell you how the authentication works and what you should do to access the protected endpoints; if you are the developer of the API, you should know how it works directly.

In this chapter, we used JWT authentication, which is the most common form of authentication nowadays, even if you are dealing with identity providers such as Microsoft, Google, and Facebook, rather than the custom flow that we built; they all work the same. With this authentication scheme to access a protected endpoint in the API, all you should do is send the access token that the API gave to you in the login...