Tag:asp.net
-
Time:2021-1-18
preface For a simple overview of static resources, we will go deep into it later in the series of reorganizing. Net core. text When we add middleware, we write as follows: app.UseStaticFiles(); The default is to provide resources for wwwroot. So I’ll visit https://localhost :44330/js/ site.js Resources can be accessed. // Please see documentation at […]
-
Time:2021-1-13
Create the first MVC project [Select] ASP.NET Web application (. Net framework) Choose the path you created Choose MVC Congratulations on your successful creation of your MVC project This article is about creating a ASP.NET This is the article of MVC 5 project, more related ASP.NET Mvc5 project content please search previous articles of developer […]
-
Time:2021-1-8
HTTP Basic Authentication In HTTP, HTTP basic authentication is an authentication method that allows web browsers or other client programs to request resources with (user name: password), and does not require cookie, session identifier, login page and other tags or carriers. -All browsers support HTTP authentication -The basic identity authentication principle does not guarantee the […]
-
Time:2021-1-7
To make a long story short: we talked about it above ASP.NET What is core declaration based access control?Today, let’s take advantage of the victory: let’s have a chat ASP.NET Authentication in the core. Authentication is the process of determining the identity of a user. Authorization is the process of determining whether a user has […]
-
Time:2021-1-6
Enterprise wechat interface document 1. Construct authorized web links 2. Call back to get the code through code + access_ Token goRequest user information 3. Get access_ token Debugging preparation work — > intranet penetration + domain name recommendation sunflower is free, free development test is enough The configuration of domain name is creditable Upper […]
-
Time:2021-1-5
preface In recent days, Xiao Ming has trouble again. Before, he didn’t give Xiao Hong the authentication and authorization, so he ran naked online. After being found by boss Ma, he scolded him severely and asked Xiao Ming to add the authorization. Quickly Baidu, found that everyone is using JWT authentication authorization, this is quite […]
-
Time:2021-1-4
preface Xiao Ming is in trouble again recently. Xiao Hong hopes to verify the data transmitted by the interface. Since it’s Xiao Hong’s requirement, Xiao Ming says that everything must be satisfied. It’s not easy. Traditional verification [HttpPost] public async Task<ActionResult<Todo>> PostTodo(Todo todo) { if (string.IsNullOrEmpty(todo.Name)) { Return OK (“name cannot be empty”); } context.Todo.Add(todo); […]
-
Time:2020-12-24
introduction Recently, I saw an open source project in zheting unified certification centerIdentityServer4.AdminWith the integration of identity server 4 and management panel, you can use it directly. When trying to deploy nginx, we encountered some problems, such as virtual directory mapping, overlong request header, wrong basic path mapping and so on. This is a simple […]
-
Time:2020-12-21
Demo address:https://github.com/william0705/JWTS Noun analysis Authentication: identify whether the user is legal or not Authorization: give users permission (which resources can be accessed) Authentication: whether the authority is legal Advantages and disadvantages of JWT advantage 1. Stateless Token stores all the authentication information. The server does not need to save the user’s authentication information, which reduces […]
-
Time:2020-12-17
preface For example, in this section, we enter the last section of JWT. JWT essentially obtains access token from the authentication server, and then users can access the protected resources later. But the key question is: how long is the life cycle of the access token set? I’ve seen that some children’s shoes that use […]
-
Time:2020-12-13
1. Routing We have already introduced Ocelot in the previous chapter. I believe you also know that Ocelot’s main function is to receive incoming HTTP requests from clients and forward them to downstream services. Ocelot currently only supports this feature in the form of another HTTP request (possibly any transport mechanism in the future).Ocelot routes […]
-
Time:2020-12-12
1. Certification When the client accesses the downstream service through Ocelot, in order to protect the downstream resources, the server will authenticate. At this time, the authentication service needs to be added in ocelot. After the authentication service is added, Ocelot will then authorize the resources that each request can access based on the authorization […]