Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
ASP.NET Core 8 and Angular

You're reading from   ASP.NET Core 8 and Angular Full-stack web development with ASP.NET Core 8 and Angular

Arrow left icon
Product type Paperback
Published in Feb 2024
Publisher Packt
ISBN-13 9781805129936
Length 804 pages
Edition 6th Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Valerio De Sanctis Valerio De Sanctis
Author Profile Icon Valerio De Sanctis
Valerio De Sanctis
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Introducing ASP.NET and Angular 2. Getting Ready FREE CHAPTER 3. Looking Around 4. Front-End and Back-End Interactions 5. Data Model with Entity Framework Core 6. Fetching and Displaying Data 7. Forms and Data Validation 8. Code Tweaks and Data Services 9. Back-End and Front-End Debugging 10. ASP.NET Core and Angular Unit Testing 11. Authentication and Authorization 12. Progressive Web Apps 13. Beyond REST – Web API with GraphQL 14. Real-Time Updates with SignalR 15. Windows, Linux, and Azure Deployment 16. Other Books You May Enjoy
17. Index

Identity API endpoints

In this section, we’ll talk about one of the most anticipated features of .NET 8: a convenient set of helpers that can be used by developers to add identity-related, REST-based endpoints to any ASP.NET Core app with (very) few lines of code. These endpoints have been specifically designed to be called by SPAs, providing them with access tokens that can be used to grant authentication and authorization rights.

On paper, we could say that these endpoints definitely seem a good fit for our scenario; we do have an SPA app that requires authentication and authorization rights, and finding a way to provide those access tokens is what we did throughout the first half of this chapter. Why did we do all this if there was a convenient built-in feature that could relieve us from all that work?

To properly answer this question, we are going to take a look at this new feature with the aim of understanding its pros and cons; as always, the best way to do that...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime