Book Image

C# 8 and .NET Core 3 Projects Using Azure - Second Edition

By : Paul Michaels, Dirk Strauss, Jas Rademeyer
Book Image

C# 8 and .NET Core 3 Projects Using Azure - Second Edition

By: Paul Michaels, Dirk Strauss, Jas Rademeyer

Overview of this book

.NET Core is a general-purpose, modular, cross-platform, and opensource implementation of .NET. The latest release of .NET Core 3 comes with improved performance and security features, along with support for desktop applications. .NET Core 3 is not only useful for new developers looking to start learning the framework, but also for legacy developers interested in migrating their apps. Updated with the latest features and enhancements, this updated second edition is a step-by-step, project-based guide. The book starts with a brief introduction to the key features of C# 8 and .NET Core 3. You'll learn to work with relational data using Entity Framework Core 3, before understanding how to use ASP.NET Core. As you progress, you’ll discover how you can use .NET Core to create cross-platform applications. Later, the book will show you how to upgrade your old WinForms apps to .NET Core 3. The concluding chapters will then help you use SignalR effectively to add real-time functionality to your applications, before demonstrating how to implement MongoDB in your apps. Finally, you'll delve into serverless computing and how to build microservices using Docker and Kubernetes. By the end of this book, you'll be proficient in developing applications using .NET Core 3.
Table of Contents (13 chapters)

Stock Checker Using Identity Server and OAuth 2

In modern development, establishing a reliable and secure interface with which to authenticate your users is absolutely essential. OAuth 2 has pretty much emerged as the de facto standard here; however, because of its history, what exactly OAuth 2 means depends on who you ask (that is, if you ask Google, they may tell you a slightly different thing from Twitter).

In fact, should you wish to have someone simply log on with a secure interface, and you have little interest in the specifics of that login process, you could do a lot worse than using one of these companies to provide your identity services. For example, users could be able to log into your website with their Twitter credentials.

In this chapter, we will be developing a stock checking application. Our application will be very basic: we'll allow people to type in a...