Ignoring a Class Property in Entity Framework 4.1 Code First
In Entity Framework (EF) 4.1, you may encounter the need to exclude certain properties from being included in the database schema. Fortunately, there are two approaches to achieve this.
[NotMapped] Attribute
This attribute is part of the System.ComponentModel.DataAnnotations namespace and can be applied to properties to indicate they should be ignored by EF.
[NotMapped] public int Age { get; set; }
Fluent API
Alternatively, you can employ the Fluent API to override the OnModelCreating function within your DBContext class:
protected override void OnModelCreating(DbModelBuilder modelBuilder) { modelBuilder.Entity<customer>().Ignore(t => t.LastName); base.OnModelCreating(modelBuilder); }</customer>
Additional Notes
- [NotMapped] works in EF versions 4.1 and later.
- The Fluent API approach is available in all versions of EF.
- Properties marked as [NotMapped] will not be mapped to columns in the database, even if they are part of an IDisposeable implementation.
Asp.NET Core (2.0)
For newer versions of EF, the approach is similar:
[NotMapped] Attribute
[NotMapped] public int FullName { get; set; }
Fluent API
modelBuilder.Entity<customer>().Ignore(t => t.FullName);</customer>
By using these techniques, you can effectively exclude properties from being mapped to the database, allowing for flexibility in your data modeling.
The above is the detailed content of How to Ignore Class Properties in Entity Framework Code First?. For more information, please follow other related articles on the PHP Chinese website!

This article explains the C Standard Template Library (STL), focusing on its core components: containers, iterators, algorithms, and functors. It details how these interact to enable generic programming, improving code efficiency and readability t

This article details efficient STL algorithm usage in C . It emphasizes data structure choice (vectors vs. lists), algorithm complexity analysis (e.g., std::sort vs. std::partial_sort), iterator usage, and parallel execution. Common pitfalls like

The article discusses dynamic dispatch in C , its performance costs, and optimization strategies. It highlights scenarios where dynamic dispatch impacts performance and compares it with static dispatch, emphasizing trade-offs between performance and

The article discusses using move semantics in C to enhance performance by avoiding unnecessary copying. It covers implementing move constructors and assignment operators, using std::move, and identifies key scenarios and pitfalls for effective appl

C 20 ranges enhance data manipulation with expressiveness, composability, and efficiency. They simplify complex transformations and integrate into existing codebases for better performance and maintainability.

This article details effective exception handling in C , covering try, catch, and throw mechanics. It emphasizes best practices like RAII, avoiding unnecessary catch blocks, and logging exceptions for robust code. The article also addresses perf

C memory management uses new, delete, and smart pointers. The article discusses manual vs. automated management and how smart pointers prevent memory leaks.

Article discusses effective use of rvalue references in C for move semantics, perfect forwarding, and resource management, highlighting best practices and performance improvements.(159 characters)


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Dreamweaver CS6
Visual web development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Atom editor mac version download
The most popular open source editor

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.
