1 00:00:00,180 --> 00:00:05,000 Let's try to recap what we have built in this section over the last five videos. 2 00:00:05,040 --> 00:00:11,850 Firstly, the starting of the section, I walk you through the Easy Bank application and its associated 3 00:00:11,850 --> 00:00:12,840 functionality. 4 00:00:12,870 --> 00:00:20,220 And its a post that we also identified that this application may need six backend services in order 5 00:00:20,220 --> 00:00:21,640 to serve its customers. 6 00:00:21,690 --> 00:00:27,960 Once we identified all those backend services, we also built associated back in code by leveraging 7 00:00:27,970 --> 00:00:34,050 risk control and implementing some static business logic, they always reconnect static response to 8 00:00:34,050 --> 00:00:35,220 the consumers. 9 00:00:35,250 --> 00:00:41,610 After that, we also validated all the six backend services with the default configurations provided 10 00:00:41,610 --> 00:00:44,640 by the spring security and observed by default. 11 00:00:44,760 --> 00:00:50,910 Spring security always tried to protect and secure all the services associated with the project. 12 00:00:50,940 --> 00:00:52,920 Later on, we tried to customize. 13 00:00:52,920 --> 00:00:59,370 As for our needs in the process, we created a new class with an annotation configuration which external 14 00:00:59,370 --> 00:01:06,810 web security configure upper class and orating and retrofit all configure which accept S2P security 15 00:01:06,840 --> 00:01:07,360 agreement. 16 00:01:07,500 --> 00:01:11,610 We also went and look into the framework code what is the default code? 17 00:01:11,610 --> 00:01:18,480 And we observed that by default, spring security tried to protect every request that is present in 18 00:01:18,480 --> 00:01:19,470 the application. 19 00:01:19,500 --> 00:01:26,220 We modified the code based upon our customer needs, where we have made for services as a secured one 20 00:01:26,220 --> 00:01:30,300 and other two services are not secured by using an DEMETRIS. 21 00:01:30,320 --> 00:01:37,420 We also discussed on how to deny all the requests using denial and permit all the requests using burm. 22 00:01:37,530 --> 00:01:44,940 With these, we made some progress compared to the Section one and we know how to customize spring security 23 00:01:45,090 --> 00:01:50,090 using and matches for my specific security implementation. 24 00:01:50,400 --> 00:01:55,920 Also attaching the source code that we discussed with this video, please download the source code and 25 00:01:55,920 --> 00:02:03,030 try to do some hensman by building some services, customizing ASPO requirement testing with a browser. 26 00:02:03,030 --> 00:02:04,680 I, I'm very excited. 27 00:02:04,680 --> 00:02:05,850 Starting next section. 28 00:02:05,890 --> 00:02:06,440 Thank you. 29 00:02:06,480 --> 00:02:06,770 By.