- ASP.NET Web API Security Essentials
- Rajesh Gunasundaram
- 320字
- 2021-07-30 10:15:52
ASP.NET Web API security architecture
This section will give you an overview of the Web API security architecture and show you all the various extensibility points that can be used for security related things. The ASP.NET Web API security architecture is composed of three main layers. The hosting layer acts as an interface between the Web API and network stacks. The message handler pipeline layer enables implementing cross-cutting concerns such as authentication and caching. The controller handling layer is where the controllers and actions are executed, parameters are bound and validated, and HTTP response message is created. This layer also contains a filter pipeline, as shown in the following figure:

Fig 1 – This image shows the components involved in securing the Web API
Let's briefly discuss the purpose of each components in the Web API pipeline, as follows:
- Open Web Interface for .NET (OWIN) is the new open standard hosting infrastructure. Microsoft has built its own framework called Katana on top of OWIN and all Web API security techniques such as authentication methods (for example, token-based authentication) and support for social login providers (for example, Google and Facebook) will be happening on the OWIN layer.
- Message Handler is a class that receives an HTTP request and returns an HTTP response. Implementing authentication at message handler level is not recommended. Message handlers are used for Cross-Origin Resource Sharing (CORS).
- Authentication Filters are guaranteed to run before the authorization filter. If you are not interested in operating your authentication logic at the OWIN layer, you can straightaway move to controllers or actions. Authentication filters are really useful to invoke OWIN-based authentication logic.
- Authorization Filters are the places in the pipeline where you can recheck the request before the actual expensive business logic stuff runs in the model binding and validation, and the controller action is invoked.
Now that we are familiar with the security architecture, we will set up the client.
- Cocos2d Cross-Platform Game Development Cookbook(Second Edition)
- PHP 7底層設計與源碼實現
- Python高級機器學習
- Learning Python Design Patterns(Second Edition)
- Java設計模式及實踐
- PHP+MySQL+Dreamweaver動態網站開發實例教程
- C語言程序設計
- Creating Stunning Dashboards with QlikView
- Visual Basic程序設計教程
- C++20高級編程
- Learning Node.js for .NET Developers
- 智能手機故障檢測與維修從入門到精通
- .NET 4.0面向對象編程漫談:應用篇
- Android應用程序設計
- Oracle SOA Suite 12c Administrator's Guide