1 00:00:00,300 --> 00:00:07,980 So now we have set up Luxo were inside our local successfully and also created an admin account inside 2 00:00:07,980 --> 00:00:08,310 it. 3 00:00:08,460 --> 00:00:16,140 Once we set up the admin account inside Keek Laakso, the very first step that we have to do is to create 4 00:00:16,140 --> 00:00:17,430 our own vielen. 5 00:00:17,550 --> 00:00:26,010 So real is a space inside any identity and access management product like Ecolog octa, which maintain 6 00:00:26,010 --> 00:00:28,080 a dedicated set of users. 7 00:00:28,200 --> 00:00:35,040 Suppose if your application is deployed into various environments like development, UTTI and production, 8 00:00:35,220 --> 00:00:41,360 definitely each environment will have different different users and different credentials. 9 00:00:41,370 --> 00:00:43,650 So far, such kind of scenarios. 10 00:00:43,800 --> 00:00:46,710 We will create different, different realms. 11 00:00:46,830 --> 00:00:52,860 Supporting different environments are different business requirements that we may have. 12 00:00:53,010 --> 00:00:57,420 We also may have a scenario like inside our organization. 13 00:00:57,630 --> 00:00:59,820 There can be multiple applications. 14 00:00:59,940 --> 00:01:06,330 And if there is a scenario where I need different, different credentials to be maintained for different 15 00:01:06,330 --> 00:01:12,150 applications, then a real is a place which will allow you to achieve that. 16 00:01:12,330 --> 00:01:19,710 So please remember, this is a space which is dedicated for a set of business use case. 17 00:01:19,800 --> 00:01:23,760 And any users are roles that you created inside. 18 00:01:23,760 --> 00:01:31,620 VM can only be used inside dedicated application for which you created a separate real. 19 00:01:31,890 --> 00:01:35,370 So now let's try to create our own real by clicking. 20 00:01:35,670 --> 00:01:37,440 Agrium by default. 21 00:01:37,620 --> 00:01:38,600 Dekalog, will you? 22 00:01:38,610 --> 00:01:39,560 A master riyal. 23 00:01:39,580 --> 00:01:41,730 But we want to create our own. 24 00:01:42,450 --> 00:01:44,280 So I'm just clicking Adriel. 25 00:01:44,520 --> 00:01:48,360 So the name that I will give here is Easy Bank Down. 26 00:01:48,630 --> 00:01:55,770 So since I'm right now in the development phase, I want to create my want real focusing development. 27 00:01:55,980 --> 00:01:58,590 So I'm just creating easy bank real. 28 00:01:58,830 --> 00:02:07,860 Once it is created inside these real easy bank dough, I can create lines Rawles users based upon my 29 00:02:07,860 --> 00:02:15,960 requirement, as you know, inside or to framework glance at the applications who are trying to use 30 00:02:16,170 --> 00:02:20,340 automation over to successfully authenticate and authorize that user. 31 00:02:20,400 --> 00:02:26,940 So for all those permissions that you want to argue for other applications and other client applications, 32 00:02:27,150 --> 00:02:29,460 you have to create lines here. 33 00:02:29,700 --> 00:02:34,190 So just like how we rent and restart as a client inside GitHub orzo. 34 00:02:34,560 --> 00:02:38,370 Similarly, we have to register the clients and our clients BAPE. 35 00:02:38,670 --> 00:02:46,860 And if you need any roles to be created like admin role, user role, you can create roles and users 36 00:02:46,860 --> 00:02:48,300 can be created here. 37 00:02:48,540 --> 00:02:50,370 Groups also can be created. 38 00:02:50,520 --> 00:02:58,470 So it provided all the out-of-the-box features that you need in order to really set up a perfect authorization 39 00:02:58,470 --> 00:03:06,780 framework by leveraging or to open a reconnect, which will make our lives easy by separating authentication 40 00:03:06,780 --> 00:03:14,250 and authorization logic into a separate product that had done everything embedding inside your resource 41 00:03:14,250 --> 00:03:14,730 server. 42 00:03:14,940 --> 00:03:17,280 So now we successfully created a real. 43 00:03:17,520 --> 00:03:26,940 So in the next lecture, let's try to create a client so that we can give those client details to applications 44 00:03:26,940 --> 00:03:32,820 where they're trying to interact with the key clocks over to perform authentication and authorization. 45 00:03:33,030 --> 00:03:33,500 Thank you. 46 00:03:33,510 --> 00:03:35,010 And I'll see you in that next lecture. 47 00:03:35,040 --> 00:03:35,400 Bye.