1 00:00:00,240 --> 00:00:07,410 Now, in this lecture, let's try to create an outline, details on the Keat Luxo so that I can use 2 00:00:07,410 --> 00:00:11,100 those plain details inside my angular application. 3 00:00:11,340 --> 00:00:15,690 So for the same, I have to click, clanked and create a client. 4 00:00:16,020 --> 00:00:20,460 So client 80 IQ is easy public client. 5 00:00:20,820 --> 00:00:24,090 So this is my client I.D. and clicking seal. 6 00:00:24,570 --> 00:00:31,770 The very first note that I had to make for this client is to make sure that access type is public. 7 00:00:32,130 --> 00:00:35,970 So, Veneri, you have access type as public, then you are Keek. 8 00:00:35,970 --> 00:00:40,260 Luxo knows that there is no secret associated for this. 9 00:00:40,470 --> 00:00:45,540 And it and it will follow Bekesi method kind of operation called Grantville. 10 00:00:45,900 --> 00:00:52,710 And also how to make sure standard flow enabled is on, because this is the attraction code grant flow 11 00:00:53,040 --> 00:01:00,780 and coming to redirect you are a winner after login inside our EASI Bank UI application, the user has 12 00:01:00,780 --> 00:01:02,370 to land it on the dashboard page. 13 00:01:02,460 --> 00:01:08,910 So due to that reason, I'm giving the value redirect you are as local host to four thousand two hundred 14 00:01:09,390 --> 00:01:09,960 dashboard. 15 00:01:10,050 --> 00:01:14,400 So this is the port where my henggeler application will be deployed. 16 00:01:14,640 --> 00:01:19,350 So I have mentioned the same under redirect to wartell, which is slash dashboard. 17 00:01:19,410 --> 00:01:24,450 This will make sure my user lands on to the dashboard of the logging operation is successful. 18 00:01:24,690 --> 00:01:31,590 And one more last configuration that I had to do is click on these advanced settings and are Prosky 19 00:01:31,590 --> 00:01:33,780 for Gornick Cent, which is Bixi. 20 00:01:33,990 --> 00:01:37,020 I have to select, yes, 256. 21 00:01:37,050 --> 00:01:45,510 So this is the cryptographic encryption algorithm that my UI application and geek like server can follow. 22 00:01:45,780 --> 00:01:52,230 To understand the code verifier and how code challenges data are based upon the code verified, we can 23 00:01:52,230 --> 00:01:55,290 also use plain but plain is pretty unsecure way. 24 00:01:55,560 --> 00:01:59,250 So due to that reason, I'm selecting, yes, 256. 25 00:01:59,370 --> 00:02:01,890 Once we make this change, we can click through. 26 00:02:02,130 --> 00:02:06,090 And if we go to the top, you can see there is no credential stop. 27 00:02:06,120 --> 00:02:11,550 The reason is this a public facing client and there is no need of credentials. 28 00:02:11,700 --> 00:02:17,730 We should only pass the client data and core to challenge during the first interaction with the key 29 00:02:17,730 --> 00:02:18,360 closo. 30 00:02:18,720 --> 00:02:25,530 And once the attrition code is received, then we should pass the client I.D. along with the quarter 31 00:02:25,530 --> 00:02:26,040 verified. 32 00:02:26,280 --> 00:02:32,400 And if the court verified and court challenges matches with the expectation that my Clerk Sarwari is 33 00:02:32,400 --> 00:02:36,390 expecting, then the user will get a successfully access token. 34 00:02:36,660 --> 00:02:40,230 So now we created successfully a public facing line. 35 00:02:40,230 --> 00:02:42,120 Details on the key blocks of what? 36 00:02:42,480 --> 00:02:43,690 And coming to the user. 37 00:02:43,710 --> 00:02:45,840 We don't have to create a separate user again. 38 00:02:45,840 --> 00:02:53,910 We can use the same user because user details, nothing have changed regardless of what approach you 39 00:02:53,910 --> 00:02:54,390 choose. 40 00:02:54,780 --> 00:02:59,640 Because the expectation from the user is always to enter the user name and password. 41 00:02:59,910 --> 00:03:03,960 So due to that design, we can use the same user that we created before. 42 00:03:03,990 --> 00:03:10,710 So with this, we all set to test the attraction called Grandcolas with the Pixy inside angular application. 43 00:03:10,980 --> 00:03:11,450 Thank you. 44 00:03:11,460 --> 00:03:12,850 And I'll see you in that next lecture. 45 00:03:12,880 --> 00:03:13,200 Bye.