Azure Virtual Machines Vs Azure App Services

Many developers getting confusion on choosing Virtual Machines over Web App services in Azure. Virtual Machine and Web App services each have their own advantages and disadvantages. Virtual Machines vs App Services Find the listed all pros and cons of Virtual Machines and App Services . Azure Virtual Machines - Pros and Cons This is … Continue reading Azure Virtual Machines Vs Azure App Services

Advertisements

Google Authentication in ASP.NET Core Application

Introduction In this blog, we will see how to authenticate the ASP.NET Core application with Google account. To achieve this, we have to setup the Google+ API in our google developer console then configure that client credentials in our ASP.NET Core application. Setup Google Developer Console To setup google developer console, follow the steps given … Continue reading Google Authentication in ASP.NET Core Application

How to setup Google Developer Console

Step 1: First, we need to create new project in Google developer console account using your google account. Step 2: Create new google account, if you don’t have one. Step 3: Navigate to google developer console page using below link using your google account. https://console.developers.google.com Step 4: Create New Project under the Library. Refer to … Continue reading How to setup Google Developer Console

How to create ASP.NET Core Web Application

Step 1: Create New Project in Visual Studio. File -> New -> Project. Step 2:Select ASP.NET Core Web Application. Type the Project Name and Click OK button. Step 3: Next Window, Select the Project template to Web Application (Model-View-Controller). Then click on Change Authentication button and chose Authentication as Individual User Account. Then click OK … Continue reading How to create ASP.NET Core Web Application

Security Best Practices for Web Applications

Introduction Security is one of the important areas, we should consider while developing web applications. In real time, there are lot of security related vulnerabilities. Here we can discuss about steps which we need to take to avoid these security related vulnerabilities while developing web applications. Below are the topics will be covered under this … Continue reading Security Best Practices for Web Applications