Implementation of HATEOAS driven apis in Springboot

July 17, 2019 Vikash 2

  In Spring boot, HATEOAS stands for “Hypermedia as the engine of application state”. Basically, it concerns with the term Hypermedia. That will be able to provide the ease access of Rest web services with the help of hypermedia driven link. Which will produce fetching or, creating CRUD operation over […]

A Basic Introduction to JSON Web Token(JWT)

January 13, 2019 Ravi Ranjan Kumar 1

In this article, you will learn the basic fundamental of JWT like how it works, what is JWT, what is the structure of JWT. If you would like to implement JWT based authentication in your API, you can either use one of the existing open source libraries JWT.io available for […]

Consume Bank details using IFSC code - Code-Adda.com

Consuming RESTful API to get Bank Details using IFSC code in C#

July 15, 2018 Ravi Ranjan Kumar 5

Introduction Suppose If you assigned the task to write code to get bank details using IFSC code. Details may be Bank name, IFSC code, MICR(Magnetic Ink Character Recognition), Branch, Address, Contact, City, District, and State. What you’ll do ? All bank IFSC codes are regularly updated on RBI website, you […]

secure ASP.NET Web API using basic authentication

How to secure ASP.NET Web API using basic authentication

April 18, 2018 Ravi Ranjan Kumar 3

ASP.NET Web API allows us different ways to implement security while exposing resources. In the previous article, we have learned about how to secure ASP.NET WEB API using token-based authentication. In this article, we are going to learn how to secure ASP.NET WEB API using basic authentication. Basic Authentication is […]

secure ASP.NET Web API using token based authentication

How to secure ASP.NET Web API using Token Based Authentication

April 7, 2018 Ravi Ranjan Kumar 13

Introduction : Whenever we work on enterprise-level application either application based on web or windows platform the first biggest concern comes in our mind is its security. When the requirement is to expose our business services to the client then securing those services is on top priority. Just because we’ve […]