Press ESC to close

Or check our Popular Categories...

Authentication and Authorization

2   Articles
2
5 Min Read
0 20

Modernizing a legacy application without disrupting its operation is a significant challenge, especially when it serves a large user base and requires constant updates. In this series, we explore how the Strangler Fig Pattern, inspired by nature, provides a practical solution for incremental migration. Learn how global companies like Netflix, Amazon, and Spotify adopted this pattern, and discover how I’ve applied it to similar projects in Norway. Follow along as we delve into the challenges, strategies, and a step-by-step process for a seamless transition to cutting-edge technology.

4 Min Read
1 115

Discover how to design and implement a robust ASP.NET Core 9 Authentication and Authorization System for a bookshop Web API. In this tutorial series, you’ll learn about user registration, role-based and permission-based access control, JWT authentication, and setting up Identity Server to create a secure and scalable application.