In this post, we’ll look at how to combine ASP.NET Core validation attributes with Value Objects. We’ll look at how the two deal with input validation on their own, outline the drawbacks of each and then proceed with the combined approach.
This guide is directed for those who have a minimum experience with Docker and a proper environment to run it. we will deploy a .Net Core 3 web API to Heroku by using Docker.
So you’ve built a web API and everything seems to be working fine. But Wait! Anyone can access your API, hit the correct url and boom your API is connected to. Though that might be heroic of you, but it shouldn’t be… I mean after all the bugs and stackoverflow.
Sample project for demonstrating Push Notifications based on Push API and Web Push Protocol in ASP.NET Core:
Learn how to build Web APIs with the new ASP.NET Core 3.0 and how to secure them with Auth0 authentication and authorization features.
This article shows how FIDO2 WebAuthn could be used for a passwordless sign in integrated into an ASP.NET Core Identity application. The FIDO2 WebAuthn is implemented using the fido2-net-lib Nuget package, and demo code created by Anders Åberg. The application is implemented using ASP.NET Core 3.0 with Identity. For information about FIDO2 and WebAuthn, please refer to the links at the bottom.
Microsoft introduced the ML.NET framework which can be used by developers to include machine learning models in their applications. In this article, Dino Esposito discusses hosting a machine learning model in ASP.NET Core 3.0.
AutoWrapper is a simple, yet customizable global exception handler and response wrapper for ASP.NET Core APIs. It uses an ASP.NET Core middleware to intercept incoming HTTP requests and automatically wraps the responses for you by providing a consistent response format for both successful and error results. The goal is to let you focus on your business-specific code requirements and let the wrapper automatically handle the HTTP response.
Authorization refers to limiting the access of the system to the user according to their roles. There are different roles in an organization and we can provide access to the resources according to their position or role in the organization. There are various technique for Authorization and authentication like JWT Authentication, Windows Authentication, Cookies Authentication, etc. So, we will be learning cookie based authentication and authorization with encrypt password using Guid data type key