You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: sessions/Season-05/0505-ApiDesignAndDevelopment/README.md
-5Lines changed: 0 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,6 @@ In response to [question #79](https://github.com/csharpfritz/csharp_with_csharpf
9
9
- Caching
10
10
- Pagination Strategies
11
11
- Uploading files
12
-
- Authentication with JWT
13
12
- Connecting to a frontend framework: Razor Pages, Blazor, etc
14
13
- Deployment - Containers and App Service
15
14
@@ -149,10 +148,6 @@ Security steps that reduce the likelihood of a successful attack are:
149
148
150
149
You will need to [extend the configuration of Kestrel](https://docs.microsoft.com/aspnet/core/mvc/models/file-uploads?view=aspnetcore-5.0#server-and-app-configuration) in order to receive larger files.
151
150
152
-
## JWT Authentication
153
-
154
-
Blog at: https://devblogs.microsoft.com/aspnet/jwt-validation-and-authorization-in-asp-net-core/
155
-
156
151
## Configuring CORS
157
152
158
153
[Cross-Origin Resource Sharing (CORS) can be configured](https://docs.microsoft.com/aspnet/core/security/cors?view=aspnetcore-5.0) in your application with a policy using settings like the following:
0 commit comments