1 00:00:00,300 --> 00:00:08,140 We discussed a lot about password encoders and how security leverages them for violating the password. 2 00:00:08,280 --> 00:00:11,850 So let's try to quickly recap what we discussed in this Section four. 3 00:00:12,120 --> 00:00:19,260 At the very start of this section, we verified hotspring security, trying to validate the passwords 4 00:00:19,260 --> 00:00:22,030 by default and in the cases of hasheem. 5 00:00:22,380 --> 00:00:29,040 And we also discussed about the general terms, what is encoding encryption and hashing out, what's 6 00:00:29,040 --> 00:00:30,180 the difference between them? 7 00:00:30,420 --> 00:00:37,500 And finally decided that hacking is the most optimal way of handling and storing the passwords inside 8 00:00:37,500 --> 00:00:39,260 your application and that database. 9 00:00:39,660 --> 00:00:46,260 And also we looked at what is a password encoded interface, what kind of methods that we have to override 10 00:00:46,260 --> 00:00:47,630 if we want to implement that. 11 00:00:47,910 --> 00:00:50,520 And we saw there are two important methods inside it. 12 00:00:50,700 --> 00:00:53,820 One is encode and other one is Matyas. 13 00:00:54,270 --> 00:00:59,700 We also discussed about what the various passwords and codes which are provided by spring security by 14 00:00:59,700 --> 00:01:07,710 default, and decided that secret password encoder and a script password encoders as the most powerful 15 00:01:07,710 --> 00:01:08,700 password in Congress. 16 00:01:08,850 --> 00:01:15,270 And any application can use them safely without any issues or daily discussions. 17 00:01:15,330 --> 00:01:22,710 We also updated our application by implementing a secret password and and at the same time maintaining 18 00:01:22,890 --> 00:01:27,650 user details in the database with the hash tag password that follows the script. 19 00:01:27,710 --> 00:01:34,080 Algate and at the end of the section, we also discussed the importance of the crypto package that is 20 00:01:34,080 --> 00:01:39,780 provided by spring security and what kind of features that it provides in terms of key generators, 21 00:01:39,780 --> 00:01:41,820 encryption and decryption of that data. 22 00:01:42,120 --> 00:01:47,730 So with this, we are done with the password encoder, which is the most important component in the 23 00:01:47,730 --> 00:01:49,890 authentication flow of spring security. 24 00:01:50,100 --> 00:01:56,090 If we have any questions, please feel free to post in the Q&A and I will see you in the next room. 25 00:01:56,310 --> 00:01:56,780 Thank you. 26 00:01:56,790 --> 00:01:57,060 By.