1 00:00:00,300 --> 00:00:06,510 Let's quickly try to revise what we have discussed in this entire section at the starting of the section, 2 00:00:06,510 --> 00:00:13,320 we explored and set up the U.S. application of Easy Bank, which is based upon angle. 3 00:00:13,590 --> 00:00:22,320 We installed various packages that it needs, like no angler's VLA and install all the packages inside 4 00:00:22,590 --> 00:00:23,370 Pakistan. 5 00:00:23,400 --> 00:00:26,250 Jason, was that with any command? 6 00:00:26,250 --> 00:00:35,010 And so also to make our application up and running, we also important packages and classes inside our 7 00:00:35,010 --> 00:00:43,620 HENGGELER project like Component's Services Interceptor and how to backtrace using the constraints present 8 00:00:43,620 --> 00:00:51,300 inside the Abda constant fight was that I also showed you the back changes that I have done, like various 9 00:00:51,300 --> 00:00:56,730 controllers that I have built, along with the corresponding repositories. 10 00:00:56,730 --> 00:01:05,410 Entities which we used to perform covert operations onto the database was that we looked into what is 11 00:01:05,410 --> 00:01:13,170 a cost issue, under which scenarios costs will come and we identified costs will rise in the scenarios 12 00:01:13,320 --> 00:01:19,260 with two different applications, with the different origins, trying to communicate with each other 13 00:01:19,500 --> 00:01:21,840 and how to configure back. 14 00:01:21,840 --> 00:01:29,970 And so to pass on that cost parameters so that Brossette won't complain about the cost policy issue. 15 00:01:30,210 --> 00:01:38,190 Lastly, we also look toward the CSA, under which scenario a hacker can perform CSIRO attack, even 16 00:01:38,190 --> 00:01:44,450 though we are making sure all secure mechanisms are applied on the application. 17 00:01:44,580 --> 00:01:53,900 So to work on that CSIRO attacks, we went and implemented CSIRO token approach where a Bakan will always 18 00:01:53,910 --> 00:02:01,200 indebted CSIRO have taken on the very first request and the UAE will pass the same token again and again 19 00:02:01,200 --> 00:02:04,290 for all the further requests coming from the Groser. 20 00:02:04,530 --> 00:02:12,930 So below are the configurations that we have done inside the configure return both for cards and CSIRO 21 00:02:13,200 --> 00:02:13,860 issues. 22 00:02:14,250 --> 00:02:21,960 Since the focus of this course is on spring security, I would request you to understand this course 23 00:02:21,960 --> 00:02:23,790 and CSIRO configurations. 24 00:02:23,940 --> 00:02:31,200 How we can do is bring security along with this video, attaching the latest Angler Project and the 25 00:02:31,200 --> 00:02:32,190 back end project. 26 00:02:32,520 --> 00:02:39,720 Please download and set up in your local system and run the scripts onto the database that I have given 27 00:02:39,720 --> 00:02:44,340 inside the back end project and try to test and to get in the process. 28 00:02:44,580 --> 00:02:50,250 You can explore more what we have done in the Anjelah project, like how the request will come from 29 00:02:50,250 --> 00:02:54,670 the pages to component component to service service to back. 30 00:02:54,670 --> 00:02:58,410 And if you have any questions, please post in queue. 31 00:02:58,410 --> 00:03:02,700 And the question I will respond to them as soon as possible with this. 32 00:03:02,850 --> 00:03:07,400 Let's try to wrap it up this section and I'll see you in the next section by.