TechBubbles Microsoft Technology BLOG

CategoryWebservices

Impersonation and Delegation in WCF

  Impersonation is a technique that WCF Services use to authorize the caller’s identity to access to service resources such as files and database tables. Service resources can be located either on local service machine or remotely hosted. The resources are being accessed by WCF Service’s process identity or specific windows identity. Difference between Impersonation and Delegation in WCF...

How to choose right WCF binding?

Binding in WCF defines how clients can connect with your service. The base class for all bindings in WCF is System.ServiceModel.Channels.Binding. A Binding includes definition for WS-* protocols used, the message encoding and the transport protocol.
The available WCF Bindings are

wsHttpBinding
basicHttpBinding
netTcpBinding
netNamedPipeBinding
netMsmqBinding
wsDualHttpBinding

Transport and Message Security in WCF

This post discusses about transport and message security. In Transport Security user credentials and claims are passed using transport layer. The transport protocols are TCP, HTTP, MSMQ and IPC. Each of these protocols have their own mechanism for passing user credentials. The most common approach is using secure socket layer(SSL) for encrypting the details which sent over HTTPS.
 

WCF 4.5 Features

  This post discusses the new features in WCF 4.5. There have been significant improvements in WCF 4.5 on configuration. Simplifying the generated configuration file in client A client configuration file is generated when you add a service reference in Visual Studio 2010. The configuration files in earlier version of WCF contained the value of every binding property even if it is a default...

WebSockets in ASP.NET 4.5

  This post discuss about using WebSockets in ASP.NET 4.5. You can read this post to get an understanding about WebSockets. This post shows piece of code which uses WebSockets in ASP.NET 4.5 and the code is related to simple chat application. The HTML of Web Form chat application looks as below   It contains a text box where you can type your text message and button where it sends a...

WCF Services in Windows Azure

  What is Windows Azure? Windows Azure provides developers computation power storage and can scale web applications on internet through Microsoft Datacenters. Developers can use Azure platform to build WCF service application using their existing Visual Studio 2010 expertise. Windows Azure supports the protocols and formats including SOAP, REST and XML. This post discuss about creating a...

WCF Service using MTOM in .NET FW 4

  Web services having a greater interoperability to communicate messages across heterogeneous systems, however challenge is serializing the data into XML. Users may want to send images,videos, drawings, xml documents etc. together with SOAP message.  What is MTOM? Message Transmission Optimization Mechanism (MTOM) is a mechanism of transferring transferring large amounts binary data as...

WCF Service using ASP.NET AJAX Library

More often, the data to shown in an AJAX page is retrieved from the Web server using a Web service, a Windows Communication Foundation (WCF) service. The services that can also return JavaScriptObjectNotation(JSON) are potential candidates for AJAX pages. This post explains about calling a WCF service using ASP.NET AJAX Library Data View control. The following are the steps to create and call the...

REST and SOAP

Which is better SOAP or REST? One of the most common discussions. Both REST and SOAP are different approaches in writing the service oriented applications. REST is an architectural style for building client-server applications. SOAP is a protocol for exchanging data between two endpoints...

.NET Access Control Service

My previous article explained the basics of building windows azure services. Let’s start looking at the .NET Access Control Service. .NET Access Control Service allows you to use the authentication and authorization services from external sources that are maintained by security experts. Security experts control the authentication and issue the token to the application. Application just uses...

TechBubbles Microsoft Technology BLOG

Follow me

Archives

Tag Cloud