Skip to main content

Blazor WebAssembly Custom Authentication From Scratch

In this article, we are going to explore and implement custom authentication from the scratch. In this sample, we will use JWT authentication for user authentication.

Main Building Blocks Of Blazor WebAssembly Authentication:

The core concepts of blazor webassembly authentication are:
  • AuthenticationStateProvider Service
  • AuthorizeView Component
  • Task<AuthenticationState> Cascading Property
  • CascadingAuthenticationState Component
  • AuthorizeRouteView Component
AuthenticationStateProvider Service - this provider holds the authentication information about the login user. The 'GetAuthenticationStateAsync()' method in the Authentication state provider returns user AuthenticationState. The 'NotifyAuthenticationStateChaged()' to notify the latest user information within the components which using this AuthenticationStateProvider.

AuthorizeView Component - displays different content depending on the user authorization state. This component uses the AuthenticationStateProvider service internally to get user information.

Task<AuthenticationState> Cascading Property - This property to get updated information about the user. So in any component to check user authenticated or to fetch claims of an authenticated user this cascading property need to be initialized in our components. We always prefer to create this cascading property instead of directly injecting AuthenticationStateProvider directly into our components.

CascadingAuthenticationState Component - This component helps to pass the Task<AuthenticationState> cascading property to the child components. So the most preferred way to use this component is in the 'App.razor' file all components must be encapsulated with this CasadingAuthenticationState component, by doing this all components will have access to the user authentication information by using Task<AuthenticationState> property.

AuthorizeRouteView Component - Combines the behavior of 'AuthorizeView' and 'RouteView' components, so that it displays the page matching the specified route but only if the user Authorized to see it.

Create A Blazor WebAssembly Sample App:

Let's understand the Blazor WebAssembly authentication flow by implementing a sample, so let's begin our journey by creating a sample application. While creating a sample don't select any authentication check box provided on template selection(Visual Studio), here we are going to implement authentication from scratch. The IDE's for development can be chosen base on our personal preferences, the most recommended IDE's are Visual Studio 2019 and Visual Studio Code.

Required Packages To Install:

Authentication Package:
Install-Package Microsoft.AspNetCore.Components.WebAssembly.Authentication
Browser LocalStorage Package:
Install-Package Blazored.LocalStorage

CascadingAuthenticationState And AuthrozieRouteView Components:

CascadingAuthenticationState provides Task<AuthenticateState>  cascading property which has information about the user, so all children components can use this cascading property provided by the CascadingAuthenticationState component. The ideal place to configure this CascadingAuthentication state is at App.razor file as the parent of all components of our application which means as root component, so that all components in our application can implement Task<AuthenticateState>

AuthorizeRouteView can validate the user against his roles and claims to access a particular page. In our demo AuthorizeRouteView component configuration is optional, but it is best practice to use it. In the 'App.razor' file, we need to replace the existing 'RouteView' component with the 'AuthorizeRouteView' component.
App.razor:
<CascadingAuthenticationState>
    <Router AppAssembly="@typeof(Program).Assembly">
        <Found Context="routeData">
            <AuthorizeRouteView RouteData="@routeData" DefaultLayout="@typeof(MainLayout)" />
        </Found>
        <NotFound>
            <LayoutView Layout="@typeof(MainLayout)">
                <p>Sorry, there's nothing at this address.</p>
            </LayoutView>
        </NotFound>
    </Router>
</CascadingAuthenticationState>

Custom AuthenticationStateProvider:

The 'Microsoft.AspNetCore.Components.Authorization.AuthenticationStateProvider' is the main provider in the Blazor application for authentication. So for our authentication flow process, we need to create a custom provider by inheriting the AuthenticationStateProvider as a base class.
Auth/CustomAuthenticationProvider:
using Microsoft.AspNetCore.Components.Authorization;
using System;
using System.Collections.Generic;
using System.Linq;
using System.Security.Claims;
using System.Threading.Tasks;

namespace BlazorWasm.JwtAuthLearning.Auth
{
    public class CustomAuthenticationProvider : AuthenticationStateProvider
    {
        public override Task<AuthenticationState> GetAuthenticationStateAsync()
        {
            throw new NotImplementedException();
        }
    }
}
Now register our service in DI(dependency Injection) service.
Program.cs:
builder.Services.AddScoped<AuthenticationStateProvider, CustomAuthenticationProvider>();
builder.Services.AddAuthorizationCore();
  • The 'AddAuthorizationCore()' service enables authentication to our application.

Create Account Services:

To write our logical implementations for login, logout to our application let's create service files as follow.
Services/IAccountService.cs:
using System.Threading.Tasks;

namespace BlazorWasm.JwtAuthLearning.Services
{
    public interface IAccountService
    {
	
    }
}
Services/AccountService.cs:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Threading.Tasks;

namespace BlazorWasm.JwtAuthLearning.Services
{
    public class AccountService : IAccountService
    {

    }
}
Now register our logical services in DI(dependency Injection) service
Program.cs:
builder.Services.AddScoped<IAccountService, AccountService>();

Implement The AuthorizedView Component: 

The AutherizedView component displays different content based on user authentication. Its child components are like 'Authorized'(displays only for authenticated users), 'NotAuthorized'(displays only for non authenticated users).
Pages/Index.razor:(Html Part)
@page "/"
<div>
    <AuthorizeView>
        <Authorized>
            <h1>Your Dashboard - Your Claims</h1>
            <div>
                @foreach (var claim in userClaim)
                {
                    <div>@claim.Type - @claim.Value</div>
                }
            </div>
            <div>
                <button type="button" @onclick="Logout">Logout</button>
            </div>
        </Authorized>
        <NotAuthorized>
            <h1>!Oops you need to be login to view your dashboard</h1>
            <button type="button" @onclick="Login">Login</button>
        </NotAuthorized>
    </AuthorizeView>
</div>
  • The 'AuthorizeView' component contains 'Authorized'(displayed for login users), 'NotAuthorized'(displayed for non login users).
  • In the 'Authorized' component showing all user claims. Add a button to logout the user.
  • In the 'NotAuthorized' component showing a message with a button for login.
Pages/Index.razor:(Code Part)
@code{ 
    [CascadingParameter]
    private Task<AuthenticationState> authenticationState { get; set; }
    private IList<Claim> userClaim { get; set; } = new List<Claim>() { };

    private void Login()
    {

    }

    private void Logout()
    {

    }
}
  • (Line: 3) The 'Task<AuthenticateState>' cascading property was declared.
  • (Line: 4) The collection of  'Claims' property declares to show all the claims to the users on login.
Import the following namespaces in _Import.razor file
_Import.razor:
@using Microsoft.AspNetCore.Authorization
@using Microsoft.AspNetCore.Components.Authorization
@using System.Security.Claims

Mock Claims To Test Authentication:

To understand the 'Microsoft.AspNetCore.Components.Authorization.AuthenticationStateProvider' provider effects on blazor webassembly authentication, let's add some fake claims to it for testing.
Auth/CustomAuthenticationProvider:
private ClaimsPrincipal claimsPrincipal = new ClaimsPrincipal(new ClaimsIdentity());
public override async Task<AuthenticationState> GetAuthenticationStateAsync()
{
  await Task.FromResult(0);
  return new AuthenticationState(claimsPrincipal);
}
  • The 'AuthenticationStateProvider.GetAuthenticationStateAsync()' method will be to update the users state of the application. 
  • For the 'claimsPrincipal' property we created an empty claims principal(technically non authenticated if no claims) and this property value will be consumed by 'GetAuthenticationStateAsync()' to return the AuthenticationState.
Auth/CustomAuthenticationProvider:
public void LoginNotify()
{
  var identity = new ClaimsIdentity(new[]
  {
    new Claim(ClaimTypes.Name, "Test"),
	new Claim(ClaimTypes.Email, "test@test.com")
  },"Fake Authentication");
  claimsPrincipal = new ClaimsPrincipal(identity);
  NotifyAuthenticationStateChanged(GetAuthenticationStateAsync());
}
  • (Line: 1) The 'LoginNotify()' method needs to invoke on the user tries to log in.
  • (Line: 3-7) Adding some collection of fake claims.
  • (Line: 8) Assigning those fake data ClaiPrincipal to the property 'claisPrincipal'(this property will be returned in AuthenticationState by the 'GetAuthenticationStateAsyn()' method).
  • (Line: 9) The 'AuthenticationStateProvider.NotifyAuthenticationStateChanged()' method raise a change event to update AuthenticationState. Here we are resetting the authentication by invoking the 'GetAuthenticationStateAsync'. Since we have created some fake claims now the application state will be changed as authenticated.
Auth/CustomAuthenticationProvider:
public void LogoutNotify()
{
  var anonymous = new ClaimsPrincipal(new ClaimsIdentity());
  claimsPrincipal = anonymous;
  NotifyAuthenticationStateChanged(GetAuthenticationStateAsync());
}
  • (Line: 1) The 'LogoutNotify()' method needs to invoke on the user logs out from the application.
  • (Line: 3) Creating empty claims to make the user to logout. 
  • (Line: 4) Assigning those dummy claims to 'cliamsPrincipal' property
  • (Line: 5) Here invoking the 'NotifyAuthenticationStageChanged()' method to reset the authentication state by changing the claims to empty to make the user logout.
Complete authentication provider code looks as below:
Auth/CustomAuthentiationProvider:
public class CustomAuthenticationProvider : AuthenticationStateProvider
{
  private ClaimsPrincipal claimsPrincipal = new ClaimsPrincipal(new ClaimsIdentity());
  public override async Task<AuthenticationState> GetAuthenticationStateAsync()
  {
	await Task.FromResult(0);
	return new AuthenticationState(claimsPrincipal);
  }

  public void LoginNotify()
  {
	var identity = new ClaimsIdentity(new[]
	{
	new Claim(ClaimTypes.Name, "Test"),
	new Claim(ClaimTypes.Email, "test@test.com")
	},"Fake Authentication");
	claimsPrincipal = new ClaimsPrincipal(identity);
	NotifyAuthenticationStateChanged(GetAuthenticationStateAsync());
  }

  public void LogoutNotify()
  {
	var anonymous = new ClaimsPrincipal(new ClaimsIdentity());
	claimsPrincipal = anonymous;
	NotifyAuthenticationStateChanged(GetAuthenticationStateAsync());
  }
}
Now update the AccountService logic to communicate with the CustomAuthenticationProvider as follow.
Services/IAccountService.cs:
public interface IAccountService
{
  bool Login();
  bool Logout();
}
Services/AccountService.cs:
public class AccountService : IAccountService
{
  private readonly AuthenticationStateProvider _authenticationStateProvider;
  public AccountService(AuthenticationStateProvider authenticationStateProvider)
  {
	_authenticationStateProvider = authenticationStateProvider;
  }
  public bool Login()
  {
	(_authenticationStateProvider as CustomAuthenticationProvider).LoginNotify();
	return true;
  }

  public bool Logout()
  {
	(_authenticationStateProvider as CustomAuthenticationProvider).LogoutNotify();
	return true;
  }
}
  • (Line: 3) The 'Microsoft.AspNetCore.Components.Authorization.AuthenticationStateProvider' injected into our service.
  • (Line: 10) Invoking 'LoginNotify()' method
  • (Line: 16) Invoking 'LogoutNotify()' method.
Now update our Index.razor component to use our AccountService.
Pages/Index.razor:
@inject IAccountService _accountService;
  • Inject our IAccountService 
Pages/Index.razor:
[CascadingParameter]
private Task<AuthenticationState> authenticationState { get; set; }
private IList<Claim> userClaim
{
  get
  {
   var auth =  authenticationState.Result;
   if (auth.User.Identity.IsAuthenticated)
   {
	return auth.User.Claims.ToList();
   }
   return new List<Claim>();
  }
}
  • The 'Task<AuthenticationState>' cascading property will always change on update in user state. So to receive the latest changes always we called it inside of the claims collection property.
The complete code for the Index.razor as below
Pages/Index.razor:
@page "/"
@inject IAccountService _accountService;
<div>
    <AuthorizeView>
        <Authorized>
            <h1>Your Dashboard - Your Claims</h1>
            <div>
                @foreach (var claim in userClaim)
                {
                    <div>@claim.Type - @claim.Value</div>
                }
            </div>
            <div>
                <button type="button" class="btn btn-primary"  @onclick="Logout">Logout</button>
            </div>
        </Authorized>
        <NotAuthorized>
            <h1>!Oops you need to be login to view your dashboard</h1>
            <button type="button" class="btn btn-primary"  @onclick="Login">Login</button>
        </NotAuthorized>
    </AuthorizeView>
</div>

@code{ 
    [CascadingParameter]
    private Task<AuthenticationState> authenticationState { get; set; }
    private IList<Claim> userClaim
    {
        get
        {
            var auth =  authenticationState.Result;
            if (auth.User.Identity.IsAuthenticated)
            {
                return auth.User.Claims.ToList();
            }
            return new List<Claim>();
        }
    }

    private async Task Login()
    {
        _accountService.Login();
    }

    private void Logout()
    {
        _accountService.Logout();
    }
}
Now import IAccountService namespace in _Import.razor file
_Import.razor:
@using BlazorWasm.JwtAuthLearning.Services
Now we can test our sample page as follows.

Use Test JWT Token To Test Authentication:

In the above step, we have mocked claims data to implement authentication. Now we are going to use a test JWT Token to implement authentication(In later steps we will integrate actual JWT token API, for better understand here we are doing these mocking steps)
JWT Token For Testing:
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJlbWFpbCI6Im5hdmVlbkBnbWFpbC5jb20iLCJwaG9uZSI6IjEyMzQ1Njc4OTAiLCJleHAiOjE2MDMxOTQ2MTIsImlzcyI6ImxvY2FsaG9zdDo1MDAwIiwiYXVkIjoiQVBJIn0.wRPD4THnUzLhJZhu4eNMx1ztbNAABQ9rkIEJaWBZX_c
On a single page, application tokens are saved in browser local storage. So let's register our LocalStorage service in DI(dependency injection) services.
Program.cs:
builder.Services.AddBlazoredLocalStorage();
The JWT token is an encrypted string that contains user information like claims, so we need to decrypt and read the claims from the JWT token. To read the claims from the JWT token add the following helper class to our application.
Helpers/JwtParser.cs:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Security.Claims;
using System.Text.Json;
using System.Threading.Tasks;

namespace BlazorWasm.JwtAuthLearning.Helpers
{
    public static class JwtParser
    {
        public static IEnumerable<Claim> ParseClaimsFromJwt(string jwt)
        {
            var claims = new List<Claim>();
            var payload = jwt.Split('.')[1];

            var jsonBytes = ParseBase64WithoutPadding(payload);

            var keyValuePairs = JsonSerializer.Deserialize<Dictionary<string, object>>(jsonBytes);

            claims.AddRange(keyValuePairs.Select(kvp => new Claim(kvp.Key, kvp.Value.ToString())));

            return claims;
        }

        private static byte[] ParseBase64WithoutPadding(string base64)
        {
            switch (base64.Length % 4)
            {
                case 2: base64 += "=="; break;
                case 3: base64 += "="; break;
            }
            return Convert.FromBase64String(base64);
        }
    }
}
Now update our CustomAuthenticationProvider to read the claims from the JWT token.
Auth/CustomAuthenticationProvider:
public class CustomAuthenticationProvider : AuthenticationStateProvider
{
  private readonly ILocalStorageService _localStorageService;

  public CustomAuthenticationProvider(ILocalStorageService localStorageService)
  {
   _localStorageService = localStorageService;
  }
  public override async Task<AuthenticationState> GetAuthenticationStateAsync()
  {

   string token = await _localStorageService.GetItemAsync<string>("token");
   if (string.IsNullOrEmpty(token))
   {
	var anonymous = new AuthenticationState(new ClaimsPrincipal(new ClaimsIdentity() { }));
	return anonymous;
   }
   var userClaimPrincipal = new ClaimsPrincipal(new ClaimsIdentity(JwtParser.ParseClaimsFromJwt(token),"Fake Authentication"));
   var loginUser = new AuthenticationState(userClaimPrincipal);
   return loginUser;
  }

  public void Notify()
  {
   NotifyAuthenticationStateChanged(GetAuthenticationStateAsync());
  }
}
  • (Line: 5) The 'Blazored.LocalStorage.ILocalStorageService' injected.
  • (Line: 12) Fetching token stored in browser local storage.
  • (Line: 13-17) If token not found, then we will return the empty claims(means not authenticated).
  • (Line: 18) Using 'JwtParser' helper class for retrieving claims from the token.
  • (Line: 25) The 'NotifyAuthenticationChanged()' to refresh the AuthenticationState.
Now update the logic in our AccountService files as below.
Services/IAccountService.cs:
public interface IAccountService
{
  Task<bool> LoginAsync();
  Task<bool> LogoutAsync();
}
Services/AccountService.cs:
public class AccountService : IAccountService
{
  private readonly AuthenticationStateProvider _customAuthenticationProvider;
  private readonly ILocalStorageService _localStorageService;
  public AccountService(ILocalStorageService localStorageService,
	AuthenticationStateProvider customAuthenticationProvider)
  {
	_localStorageService = localStorageService;
	_customAuthenticationProvider = customAuthenticationProvider;
  }
  public async Task<bool> LoginAsync()
  {
	string token = "copy_Past_Test_Token_in_the_article_above";
	await _localStorageService.SetItemAsync("token", token);
	(_customAuthenticationProvider as CustomAuthenticationProvider).Notify();
	return true;
  }

  public async Task<bool> LogoutAsync()
  {
	await _localStorageService.RemoveItemAsync("token");
	(_customAuthenticationProvider as CustomAuthenticationProvider).Notify();
	return true;
  }
}
  • (Line: 5-6) The 'Blazored.LocalStorage.ILocalStorageService' and 'Microsoft.AspNetCore.Components.Authorization.AuthenticationStateProvider' are injected.
  • (Line: 14) Storing the access token to the browser's local storage.
  • (Line: 15) Refreshing the AuthenticationState after storing the access token, so that AuthenticationStateProvider changes the user state.
  • (Line: 21) On logout remove the access token from the browser local storage.
  • (Line: 22) After removing the access token, refreshing the AuthenticationState.
Now update the code changes in Index.razor file as below.
Pages/Index.razor:
private async Task Login()
{
  await _accountService.LoginAsync();
}

private async void Logout()
{
  await _accountService.LogoutAsync();
}
Now test authentication flow on our page.

Integrate JWT Authentication API:

The final step of our authentication is to configure the JWT authentication endpoint. Click here to follow the steps to develop JWT Authentication. Here in our demo, I'm integrating my local JWT authentication endpoint.

Now let's create 2 model classes like LoginModel(used in the form) and AuthResponse(captures token response).
Models/LoginModel.cs:
public class LoginModel
{
  public string Email { get; set; }
  public string Password { get; set; }
}
Models/AuthResponse.cs:
public class AuthResponse
{
  public string Token { get; set; }
  public string RefreshToken { get; set; }
}
Update the 'LoginAsync' concrete method in IAccountService.
Services/IAccountService.cs:
Task<bool> LoginAsync(LoginModel model);
Update the AccountService to inject the HttpClient.
Services/AccountService.cs:
private readonly AuthenticationStateProvider _customAuthenticationProvider;
private readonly ILocalStorageService _localStorageService;
private readonly HttpClient _httpClient;
public AccountService(ILocalStorageService localStorageService,
	AuthenticationStateProvider customAuthenticationProvider,
	HttpClient httpClient)
{
  _localStorageService = localStorageService;
  _customAuthenticationProvider = customAuthenticationProvider;
  _httpClient = httpClient;
}
Update the 'LoginAsync' method implementation in AccountService.
Services/AccountService:
public async Task<bool> LoginAsync(LoginModel model)
{
  var response = await _httpClient.PostAsJsonAsync<LoginModel>("/account/login-token", model);
  if (!response.IsSuccessStatusCode)
  {
	return false;
  }
  AuthResponse authData = await response.Content.ReadFromJsonAsync<AuthResponse>();
  await _localStorageService.SetItemAsync("token", authData.Token);
  (_customAuthenticationProvider as CustomAuthenticationProvider).Notify();
  return true;
}
  • Integrated JWT authentication API to fetch the user login token
Now add the domain of JWT authentication API in Program file to the HttpClient object.
Program.cs:
builder.Services.AddScoped(sp => new HttpClient { BaseAddress = new Uri("https://localhost:5001/") });
Now add LoginModel property in Index.razor and also update the AccountService method invocation.
Index.razor:(Update Code Part)
@code{ 
    private LoginModel model = new LoginModel();

    private async Task Login()
    {
        await _accountService.LoginAsync(model);
    }
	// code hidden for display purpose
}
Now update NonAuthorized component Html with a login form as below
Index.razor:(Update Html Part)
<NotAuthorized>
	<h1>!Oops you need to be login to view your dashboard</h1>
	<div>
		<div class="form-group">
			<label for="inputEmail">Email Address</label>
			<input type="email" class="form-control" id="inputEmail" @bind="@model.Email" />
		</div>
		<div class="form-group">
			<label for="inputPassword">Password</label>
			<input type="password" class="form-control" id="inputPassword" @bind="@model.Password" />
		</div>
		<button type="button" class="btn btn-primary" @onclick="Login">Login</button>
	</div>
</NotAuthorized>
Now run the application and test the login form as below.


That's all about the Blazor WebAssembly JWT authentication from the scratch. In the next article, we will implement the integration of the RefreshToken functionality.

Support Me!
Buy Me A Coffee PayPal Me

Wrapping Up:

Hopefully, I think this article delivered some useful information on the authentication implementation from scratch in the Blazor WebAssembly application. I love to have your feedback, suggestions, and better techniques in the comment section below.

Refer:

Follow Me:

Comments

  1. You saved me a lot of time! Thank you!

    ReplyDelete
  2. When installing packages, perhaps you should say if its in the Server or the Client application??? Currently its not clear at all!!

    ReplyDelete
    Replies
    1. Hi everything client only. In this article I didnt explained any server side code

      Delete
  3. there is some error in this method: ParseBase64WithoutPadding
    because base64 string must replace like this:

    base64 = base64.Replace('-', '+').Replace('_', '/');
    and then switch (base64.Length % 4)

    ReplyDelete
  4. Really unfortunate that you don't show in this article or provide in the github repo, the CascadingAuthenticationState Component. You mention it briefly but never show how it works or provide it in the github repo, so this makes the tutorial incomplete.

    ReplyDelete
  5. I had problem with AuthenticationState not being validated each time login or logout action was called. I've been searching for the solution of this problem for some time and I found it here. Many thanks you wrote this article.

    ReplyDelete
  6. is it possible to combine it with google auth?

    ReplyDelete
  7. Hi, please let me know why this line shows me Failed to fetch,

    var response = await _httpClient.PostAsJsonAsync("/account/login-token", model);

    ReplyDelete

Post a Comment

Popular posts from this blog

Angular 14 Reactive Forms Example

In this article, we will explore the Angular(14) reactive forms with an example. Reactive Forms: Angular reactive forms support model-driven techniques to handle the form's input values. The reactive forms state is immutable, any form filed change creates a new state for the form. Reactive forms are built around observable streams, where form inputs and values are provided as streams of input values, which can be accessed synchronously. Some key notations that involve in reactive forms are like: FormControl - each input element in the form is 'FormControl'. The 'FormControl' tracks the value and validation status of form fields. FormGroup - Track the value and validate the state of the group of 'FormControl'. FormBuilder - Angular service which can be used to create the 'FormGroup' or FormControl instance quickly. Form Array - That can hold infinite form control, this helps to create dynamic forms. Create An Angular(14) Application: Let'

.NET 7 Web API CRUD Using Entity Framework Core

In this article, we are going to implement a sample .NET 7 Web API CRUD using the Entity Framework Core. Web API: Web API is a framework for building HTTP services that can be accessed from any client like browser, mobile devices, and desktop apps. In simple terminology API(Application Programming Interface) means an interface module that contains programming functions that can be requested via HTTP calls either to fetch or update data for their respective clients. Some of the Key Characteristics of API: Supports HTTP verbs like 'GET', 'POST', 'PUT', 'DELETE', etc. Supports default responses like 'XML' and 'JSON'. Also can define custom responses. Supports self-hosting or individual hosting, so that all different kinds of apps can consume it. Authentication and Authorization are easy to implement. The ideal platform to build the REST full services. Install The SQL Server And SQL Management Studio: Let's install the SQL server on our l

ReactJS(v18) JWT Authentication Using HTTP Only Cookie

In this article, we will implement the ReactJS application authentication using the HTTP-only cookie. HTTP Only Cookie: In a SPA(Single Page Application) Authentication JWT token either can be stored in browser 'LocalStorage' or in 'Cookie'. Storing the JWT token inside of the cookie then the cookie should be HTTP Only. The HTTP-ONly cookie nature is that it will be only accessible by the server application. Client apps like javascript-based apps can't access the HTTP-Only cookie. So if we use the authentication with HTTP-only JWT cookie then we no need to implement the custom logic like adding authorization header or storing token data, etc at our client application. Because once the user authenticated cookie will be automatically sent to the server by the browser on every API call. Authentication API: To authenticate our client application with JWT HTTP-only cookie, I developed a NetJS(which is a node) Mock API. Check the GitHub link and read the document on G

.NET6 Web API CRUD Operation With Entity Framework Core

In this article, we are going to do a small demo on AspNetCore 6 Web API CRUD operations. What Is Web API: Web API is a framework for building HTTP services that can be accessed from any client like browser, mobile devices, desktop apps. In simple terminology API(Application Programming Interface) means an interface module that contains a programming function that can be requested via HTTP calls to save or fetch the data for their respective clients. Some of the key characteristics of API: Supports HTTP verbs like 'GET', 'POST', 'PUT', 'DELETE', etc. Supports default responses like 'XML' and 'JSON'. Also can define custom responses. Supports self-hosting or individual hosting, so that all different kinds of apps can consume it. Authentication and Authorization are easy to implement. The ideal platform to build REST full services. Create A .NET6 Web API Application: Let's create a .Net6 Web API sample application to accomplish our

Angular 14 State Management CRUD Example With NgRx(14)

In this article, we are going to implement the Angular(14) state management CRUD example with NgRx(14) NgRx Store For State Management: In an angular application to share consistent data between multiple components, we use NgRx state management. Using NgRx state helps to avoid unwanted API calls, easy to maintain consistent data, etc. The main building blocks for the NgRx store are: Actions - NgRx actions represents event to trigger the reducers to save the data into the stores. Reducer - Reducer's pure function, which is used to create a new state on data change. Store - The store is the model or entity that holds the data. Selector - Selector to fetch the slices of data from the store to angular components. Effects - Effects deals with external network calls like API. The effect gets executed based the action performed Ngrx State Management flow: The angular component needs data for binding.  So angular component calls an action that is responsible for invoking the API call.  Aft

Angular 14 Crud Example

In this article, we will implement CRUD operation in the Angular 14 application. Angular: Angular is a framework that can be used to build a single-page application. Angular applications are built with components that make our code simple and clean. Angular components compose of 3 files like TypeScript File(*.ts), Html File(*.html), CSS File(*.cs) Components typescript file and HTML file support 2-way binding which means data flow is bi-directional Component typescript file listens for all HTML events from the HTML file. Create Angular(14) Application: Let's create an Angular(14) application to begin our sample. Make sure to install the Angular CLI tool into our local machine because it provides easy CLI commands to play with the angular application. Command To Install Angular CLI npm install -g @angular/cli Run the below command to create the angular application. Command To Create Angular Application ng new name_of_your_app Note: While creating the app, you will see a noti

Unit Testing Asp.NetCore Web API Using xUnit[.NET6]

In this article, we are going to write test cases to an Asp.NetCore Web API(.NET6) application using the xUnit. xUnit For .NET: The xUnit for .Net is a free, open-source, community-focused unit testing tool for .NET applications. By default .Net also provides a xUnit project template to implement test cases. Unit test cases build upon the 'AAA' formula that means 'Arrange', 'Act' and 'Assert' Arrange - Declaring variables, objects, instantiating mocks, etc. Act - Calling or invoking the method that needs to be tested. Assert - The assert ensures that code behaves as expected means yielding expected output. Create An API And Unit Test Projects: Let's create a .Net6 Web API and xUnit sample applications to accomplish our demo. We can use either Visual Studio 2022 or Visual Studio Code(using .NET CLI commands) to create any.Net6 application. For this demo, I'm using the 'Visual Studio Code'(using the .NET CLI command) editor. Create a fo

Part-1 Angular JWT Authentication Using HTTP Only Cookie[Angular V13]

In this article, we are going to implement a sample angular application authentication using HTTP only cookie that contains a JWT token. HTTP Only JWT Cookie: In a SPA(Single Page Application) Authentication JWT token either can be stored in browser 'LocalStorage' or in 'Cookie'. Storing JWT token inside of the cookie then the cookie should be HTTP Only. The HTTP-Only cookie nature is that it will be only accessible by the server application. Client apps like javascript-based apps can't access the HTTP-Only cookie. So if we use authentication with HTTP only JWT cookie then we no need to implement custom logic like adding authorization header or storing token data, etc at our client application. Because once the user authenticated cookie will be automatically sent to the server by the browser on every API call. Authentication API: To implement JWT cookie authentication we need to set up an API. For that, I had created a mock authentication API(Using the NestJS Se

ReactJS(v18) Authentication With JWT AccessToken And Refresh Token

In this article, we are going to do ReactJS(v18) application authentication using the JWT Access Token and Refresh Token. JSON Web Token(JWT): JSON Web Token is a digitally signed and secured token for user validation. The JWT is constructed with 3 important parts: Header Payload Signature Create ReactJS Application: Let's create a ReactJS application to accomplish our demo. npx create-react-app name-of-your-app Configure React Bootstrap Library: Let's install the React Bootstrap library npm install react-bootstrap bootstrap Now add the bootstrap CSS reference in 'index.js'. src/index.js: import 'bootstrap/dist/css/bootstrap.min.css' Create A React Component 'Layout': Let's add a React component like 'Layout' in 'components/shared' folders(new folders). src/components/shared/Layout.js: import Navbar from "react-bootstrap/Navbar"; import { Container } from "react-bootstrap"; import Nav from "react-boot

A Small Guide On NestJS Queues

NestJS Application Queues helps to deal with application scaling and performance challenges. When To Use Queues?: API request that mostly involves in time taking operations like CPU bound operation, doing them synchronously which will result in thread blocking. So to avoid these issues, it is an appropriate way to make the CPU-bound operation separate background job.  In nestjs one of the best solutions for these kinds of tasks is to implement the Queues. For queueing mechanism in the nestjs application most recommended library is '@nestjs/bull'(Bull is nodejs queue library). The 'Bull' depends on Redis cache for data storage like a job. So in this queueing technique, we will create services like 'Producer' and 'Consumer'. The 'Producer' is used to push our jobs into the Redis stores. The consumer will read those jobs(eg: CPU Bound Operations) and process them. So by using this queues technique user requests processed very fastly because actually