Solved

Consuming XML from REST-ful services

Posted on 2014-02-12
3
498 Views
Last Modified: 2014-02-17
After about 2 weeks of reading just about anything there is to read online about WCF, REST-ful services and consuming XML, I am more confused than ever. I was hoping someone could simplify this concept for me.  Here is what I need to do, but have no idea how to do it the "right" way (i.e. the most efficient way)

1. I have to send a GET request to a third-party URL (authenticated) - I have done this successfully in a web browser, so assured it works.
2. This request returns XML
3. I need to read that XML and display it on our web page.

Sounds very simple, but where I am unclear is:

1. Do I have to write a service on my end to send the request or is this just something I can do in my code-behind?
2. Do I have to write a service on my end to receive the request or is this something I can do in my code-behind?

I'm pretty sure I can figure out how to deserialize the XML once I get it, but I'm not sure how to get it from point A (the third-party server) to point B (my server).  I would never be processing more than 1 record at a time, or doing a POST or DELETE. It would only be getting one (extremely long) XML file based on an ID I send.

I have read so many different articles and approaches that I think I confused myself.
0
Comment
Question by:vcbertini
  • 2
3 Comments
 
LVL 51

Accepted Solution

by:
Julian Hansen earned 500 total points
ID: 39855437
1. No - you just make a GET request to the resource that returns the XML
2. No - part of making the request will be to get the returned data.

Have you had a look at this article from Microsoft?

http://msdn.microsoft.com/en-us/library/hh534080.aspx
0
 

Author Closing Comment

by:vcbertini
ID: 39865463
Great, thank you.  I think I finally got some code in place to read the XML in my code-behind. Now I have to figure out how to process it.
0
 
LVL 51

Expert Comment

by:Julian Hansen
ID: 39866660
You are welcome - thanks for the points
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Summary: Persistence is the capability of an application to store the state of objects and recover it when necessary. This article compares the two common types of serialization in aspects of data access, readability, and runtime cost. A ready-to…
The Confluence of Individual Knowledge and the Collective Intelligence At this writing (summer 2013) the term API (http://dictionary.reference.com/browse/API?s=t) has made its way into the popular lexicon of the English language.  A few years ago, …
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now