- Course
Master-Detail Workflow Apps with EF, MVC, Identity 2, and Modals
Start with plain ASP.NET MVC and a couple of free add-ins, and you'll finish with a complete non-WF workflow application with fleshed-out Identity 2 security, hierarchical data structured as a tree-based UI, parent-child views with multiple child entities, child editing in Bootstrap modals, AutoComplete dropdown lists, workflow rules built into entities, an audit trail, snapshotting, cloaking, and concurrency handling.
- Course
Master-Detail Workflow Apps with EF, MVC, Identity 2, and Modals
Start with plain ASP.NET MVC and a couple of free add-ins, and you'll finish with a complete non-WF workflow application with fleshed-out Identity 2 security, hierarchical data structured as a tree-based UI, parent-child views with multiple child entities, child editing in Bootstrap modals, AutoComplete dropdown lists, workflow rules built into entities, an audit trail, snapshotting, cloaking, and concurrency handling.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Core Tech
What you'll learn
This course teaches a lot of asked-for solutions, like fleshing-out Identity 2 into a complete security application with all the features and functionality hinted-to but not fleshed-out in the scaffolded code; building tree structures from hierarchical data and embedding business rules for its behavior; adding server-side searching, sorting, and pagination to Index views; creating parent-child views with multiple child entity collections; adding, editing, and deleting child entities using Bootstrap modal dialogs; creating Google-like AutoComplete dropdown suggestion lists; snapshotting temporarily-related data; adding workflow rules to entities and incorporating them into a unified work list user interface; creating an embedding an audit trail of user activities; cloaking data rather than deleting it; and handling multi-user concurrency.