►
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
A
A
B
B
Well,
then
I
will
come
back
and
introduce
myself
so
as
not
to
I
am
in
the
morning
event
talk.
My
name
is
robert
hedgehog.
I
am
the
leader
of
the
services
team
at
Página,
Servicios
Limited
I
have
been
working
with
the
company
for
almost
six
years
now.
I
am
based
in
the
city
of
Barranquilla
in
Colombia
and
I
think
it
is
the
second.
B
And
I'm,
going
to
start
talking
about
prepara,
platón,
community
or
the
platform
for
community
in
the
agresso
event
talk
the
enterprise
version.
The
community
version
of
our
product
is
focused
on
the
creation,
innovation
and
elevation
of
applications.
It
is
a
100%
open
source
product.
Anyone
can
download
the
source
code,
compile
and
package
it
it
in
a
server
or
in
a
distribution
that
corresponds
to
them
for
their
applications
is
focused
for
development
projects.
B
The
focus
of
this
edition
of
our
product
is
standards
and
innovation.
Everything
innovative
all
the
news
about
the
microsoft
jakarta
ecosystem
will
always
come
first
in
this
version,
which
receives
monthly
releases
that
are
not
guaranteed
Anything,
but
basically,
we
try
every
month
to
release
something
significant
for
the
community
to
benefit
from,
on
this
platform,
a
distribution
that
is
going
to
be
the
core
or
the
cornerstone
of
the
demo.
That
I
am
going
to
show
you
wait.
B
Clause,
cloud-friendly,
is
a
way
to
guarantee
running,
jakarta
applications
in
containers
and
for
those
who
were
about
to
talk
about
selling
themselves
in
the
morning,,
also
for
micro
500,,
the
cornerstone
of
our
product
that
is
coming
out,
soon,,
which
is
to
ask
camps,,
then
the
main
topic
The
main
part
of
this
talk
is
security.
Itself.
It
is
difficult.
Every
day
we
are
hearing
from
companies
that,
for
better
or
worse,
have
suffered
some
kind
of
security,
breach,
user
data
has
been
compromised,
or
some
kind
of
attack
could
have
compromised
integrity.
B
and
the
confidentiality
of
the
information
that
is
handled
in
some
of
these
platforms
in
the
cloud
or
on
the
internet,
any
service
that
is
public.
That
has
been
exposed,,
as
is
not
known
in
any
service,,
is
100%
secure.
The
issue
of
security
is
basically
to
do
everything
everything
possible
to
make
life
difficult
for
attackers
to
get
the
information
they
want
to
get
or
the
impact
they
want
to
create.
B
Then
one
of
the
biggest
concerns
for
a
software
developer
or
for
an
application
developer
is
how
to
answer
these
four
questions
of
appropriately,
how
you
can
securely
manage
user
identities,
from
saving
users
to
the
user
data
between
your
plane
or
in
an
encrypted
table,
or
should
I
distribute
some
kind
of
qüetta
or
storage
in
isolation
to
the
main
data
source.
To
prevent
this
data
from
being
displayed
by
attackers,
how
can
I
apply
security
patterns
without
reinventing
the
wheel?
The
idea
is
Well,.
B
There
is
already
so
much
that
algorithms
and
open
source
products
have
been
discussed,,
perhaps
in
a
very
good
work
and
patterns
of
how
to
apply
these
products
in
a
practical
way,.
Why
should
I
basically
reinvent
that
code
again,
if
that
code
is
practically
to
be
used
more
in
the
ecosystem?
of
yoga,,
which
is
not
only
ecosystems,,
which
is
a
matter
of
better
integration
with
security
technologies
and
security,
standards,,
ensuring
microservices
and
minimizing
risks
when
developing
microservices,
an
application
is
being
separated
into
multiple
components
that
are
going
to
be
isolated,?
B
The
risk
is
higher
because,
instead
to
secure
one,,
one
must
secure
multiple
microservi.
Each
of
them
must
follow
the
security
standards
that
correspond
to
the
microservice
according
to
the
sensitivity
of
the
data
that
is
handled,
and
the
important
thing
is
to
reduce
the
risks
by
trying
to
prevent
these
services
from
being
attacked
and
finally
reduce
the
impact
attention,
because
whenever
a
security
mechanism
is
implemented,
there
is
always
an
increase,
no
matter
what
one
wants
every
time.
B
One
of
the
two
is
encrypted
is
a
table
or
the
communication
between
one
point
and
another,
either
in
the
protocol
that
you
pp
or
any
type
of
communication
that
is
made
that
impacts
the
performance
of
the
application,
because
I
have
to
do
extra
tasks
to
find
the
information
or
to
protect
the
information
in
some
way,.
Then
this
impact
must
be
measurable,.
It
must
be
the
minimum
possible,.
B
Oracle
also
has
multiple
identity
platforms
that
support
their
cloud,
also
for
on-premises
servers
and
in
that
sporting,
very
popular
open
source
skiing,
but
also
that
it
has
clearly
gained
a
lot
of
attraction
in
recent
years.
So
the
objective
of
the
talk
is
to
focus
on
opt
because
it
opts
well,
and
I
am
not
nor
am
I
associated
with
it
in
any
way.
B
In
fact,
I
have
versions
of
this
same
talk
with
help
and
also
has
been
preparing
a
version
with
tyc
lock
to
try
to
make
it
as
unbiased
as
possible,
but
ro
together
of
the
three
services
of
one
of
the
services
that
I
liked,
because
it
follows
the
open
standard
very
well
to
the
letter
of
connect,.
It
is
a
standard
for
the
exchange
of
secure
user
data
information
in
the
cloud,,
not
all
services,
they
strictly
follow
some
take
certain
liberties,
but
now,
in
fact
it's
a
very
good
job
following
all
the
standard.
B
Besides,
they
may
have
the
standards.
They
also
deliver
new
features
and
extra
things
that
other
services
don't
have
like
apis
interfaces,
easy
to
use,
but
almost
All.
The
services
have
integration
through
APIs
and
good
documentation
of
these
interfaces.
It
also
has
multi-factor
authentication
support
and
social
connectors.
B
B
To
give
you
information
and
to
tell
you
in
the
resolution
of
incidents
and
manages
certain
performances
in
the
performance
impact
on
the
applications
is
very
unclear
is
that
he
placed
it
with
an
asterisk
next
to
it,
because
there
are
many
factors
that
influence
the
generic
performance
of
an
application
in
the
cloud
in
network
latency,
availability
in
the
globe,
how
many
users
and
the
workload
on
that
application,
etcetera,
etcetera,
but
hey.
This
is
a
very
good
service
that
I
recommend,
like
the
others
that
I
have
mentioned
so.
B
As
effectively
apply
security
to
microservices,
because
microservices
are
usually
supported
in
communication
state,
they
are
communication
and
powerful
I
send
a
request
for
a
service
through
the
http
protocol
and
it
waits
for
a
response,
and
as
long
as
I
send
the
same
voice
parameters
for
the
same
response
without
affecting
the
system
state,
then
for
which
communication
is
next.
First
The.
B
Loading
and
handling
of
data
that
is
saved
in
memory
is
minimal,
that
is,
the
data
is
saved
exclusively
when
it
should
be
stored
in
the
persistence
scheme
and
the
corresponding
components
that
are
going
to
be
in
charge
of
that
persistence
are
the
only
ones
that
have
access
to
the
data
stores,,
whether
it
be
data,,
whether
it
be
in
a
sql
database
or
an
antonio
database,,
a
file
system,,
a
bucket,,
nadu,
is,,
etc.,,
etc.,
and
these
mechanisms
must
effectively
validate
the
requests
separately
from
each
request
that
I
sent
Although.
These
services
must
be
validated,.
B
I
cannot
save
time
by
saving
data,
cache
and
validating
those
requests,
or
assuming
that
these
requests
will
follow
a
parameter,
because
with
that
it
is
bringing
risks
of
securing
the
system.
And
secondly,
when
I
validate
that
security
context,
that
is,
the
data
of
the
incoming
user
calling
my
service,
if
that
call
is
propagated
to
other
services
within
my
In,
the
same
ecosystem,
I
have
to
propagate
the
security
context,
to
obviously
prevent
this
information
from
being
sent
anonymously,.
B
So
one
of
the
most
recommended
solutions
is
to
use
jason
web
tokens,,
which
is
a
standard
for
exchanging
user
data
information
dynamically
and
to
microservices
and
any
type
of
communication
based
on
http.
So
for
those
who
don't
know
about
them,
websites,
tokens
are
a
standard.
It's
based
on
an
rfc
of
75
19
as
a
token
or
basically,
a
data
structure
and
well,
it's
not
specified
and
codified
for
all.
B
The
word
contains
the
information
of
3
data
sources
of
the
the
security
context
of
the
user,
that
is
making
an
http
call
a
header
that
contains
the
type
of
the
token
the
encryption
algorithm
with
which
the
token
is
being
encoded,
a
payload
with
the
corresponding
information
data
and
a
signature.
In
this
case,
the
signature
contains
the
data
of
the
public
key
and
the
key
e
private
that
were
used
to
sign
that
touch,.
Then,
within
the
token,
there
must
be
a
series
of
affirmations
or
klein,
that
is,.
B
It
is
what
the
token
affirms
that
corresponds
to
the
user
data,
and
that
is
all,.
Those
affirmations
are
standard,.
They
are
within
the
rfc
each
provider
of
an
identity
solution
in
the
cloud
or
on
premises
or
whatever,.
It
must
provide
tokens
that
have
these
affirmations,
yes
or
yes,
then
blood
jason
web
token
has
arrived.
It
is
still
in
the
open
andy
connect
standard.
It
is
an
interoperable
authentication
protocol.
B
The
idea
is
that
any
identity
solution
can
be
integrated
with
any
application,,
be
it
an
espa
application
that
exposes
services
to
an
app
and
a
mobile
application,
or
an
application
on
a
server,
etc.,.
When
it
is
necessary
to
manage
the
identity
information
of
a
user,,
it
was
an
open.
A
di
connect
standard
delivers
some
messaging
flows
of
how
information
should
be
exchanged
between
the
provider
of
these
user
data,
the
server
that
authenticates,
this
user
data
and
the
service
that
needs
to
use
this
user
data,
as
there
are
so
many
parties
to
this
communication.
B
These
messaging
flows
have
to
be
well
documented
and
have
to
indicate
a
strategy
of
how
they
are
going
to
change
the
information
in
a
way
secure
and
what
to
do
in
the
event
that
the
authentication
authorization
succeeds
or
fails.
It
is
ideal
for
everything
that
is
communication
with
resident
are.
The
standard
is
basically
on
top
of
or
built
on
top
of
http,
because
it
is
built
on
top
of
the
8
standard.
B
Which,
well,
started
as
a
standard,,
a
proprietary
technology
from
google
that
they
later
opened
to
the
community
and
has
served
to
connect
and
integrate
multiple
services
in
that
this
is
where
micro
profile
comes
into
all
of
this,
because
for
those
who
do
not
know
macro
profile,
it
was
initially
a
technology
focused
on
microservices
as
a
kind
of
warhorse
to
speed
up
app
development,
cloud-native
communications
and
microservices
back.
Then
it
was
not
so
fast.
The
idea
is
right
now,
micro,
because
false
is
oriented
to
the
cloud.
B
Am
there
is
a
huge
debate
to
disintegrate
micro
profile
within
jakarta
as
a
series
of
sub
specifications
or,
if
allow
my
greatest
prophecy,
to
run
free
and
continue
to
grow
as
a
completely
separate
set
of
technologies?
At
the
moment,
I'm
not
very
invested
in
that
debate,
but
I
know
that
at
the
moment
people
are
going
to
be
pretty
heated
and
there
are
arguments
for
and
against,
but
the
important
thing
is
that
it
is
a
technology,.
B
It
is
a
group
of
specifications
that
allow
an
integration
technology
with
applications
based
on
microservices
and
for
the
cloud,,
and
the
specification
that
we
are
going
to
focus
on
is
probably
michael
profile
days
of
one
tokens,,
which
is
basically
how
to
validate
and
propagate
tokens
received
by
applications
developed
in
micro
profile.
The
current
version
is
1.2.1
and
any
iera
can
go
to
the
eclipse
foundation
website
and
read
what
the
specification
delivers.
What
the
specification
handles
first
to
do
role
based
access
control.
B
The
idea
is,
I
define
an
application
and
that
application
can
only
be
accessed
by
users
who
they
are
authorized
in
certain
roles.
If
those
roles
do
not
belong
to
their
users,
I
will
always
receive
a
403
error
of
forbidden
access
to
those
resources,
but
to
make
this
authentic.
This
authorization,
first
of
winston,
do
an
introspection
of
the
identity
of
the
user,
that
is
to
say
who
I
am,
is
calling
who
is
calling
these
services
and
after
identifying
that
I
have
to
validate
that
identity.
B
What
I
already
know
is
calling
now
I
have
to
verify
that
this
user
is
the
one
who
corresponds
and
finally,
an
access
verification
is
done
since
I
am
already
100.
Who
is
this
user
and
what
does
who
says
they
are
now
I
have
to
verify
if
they
are
authorized
to
call
the
resources
they
see.
Jay's
tab
doublet,
clearly
a
flexible
variation
of
affirmations,
because
not
all
identity
solutions,
services
strictly
follow
the
standard
and
doublet
to
the
letter
and
some
that
take
certain
liberties
with
some
affirmations
or
klein.
B
There
are
others
that
also
add
affirmations
that
it
contains
useful
information,
but
they
are
not
within
the
standard.
So
it
has
been
recognized
that
if
it
is
necessary
to
allow
those
assertions
to
be
validated
in
a
flexible
way,
then
to
show
all
this
I
am
going
to
show
you
a
little
of
an
application
that
is
integrated
with
opta.
For
those
who
want
to
know
the
code.
It
is
available
in
my
repository
of
type
micro
service
that
cta
demo
and
the
this
demo
com
is
composed
of
a
basically.
It
is
a
very
basic
conference
manager
application.
B
It
has
three
components:
two
microservices
written
in
jakarta
and
macro
profile,
a
speaker
service
that
is
used
to
manage
the
speakers
of
the
event
and
in
being
session
service
that
is
used
to
manage
the
sessions
and
talks
of
the
event.
The
third
component
is
an
s&p
web
application
written
in
angular
that
is
connected
to
the
microservices.
B
This
time
will
consist
of
one
of
three
roles
that
will
be
the
roles
of
test
integration
with
gluten.
The
first,
the
first
role,
gen
administrator
axes
can
basically
do
all
these
functions,
create
new
session
chats
view,
delete
them
view
all
registered
speakers
and
accept
speakers
to
the
event.
The
speakers
can
then
view
their
fellow
speakers
within
the
event
or
register
as
effective
speakers
who
are
going
to
give
a
talk.
B
And,
finally,
the
attendees
are
the
ones
who
attend
the
events
view
all
the
registered
speakers
view
all
the
session
talks
and
thus
have
a
session
in
case.
They
are
interested,
then
demonstrate
this
here.
I
have
the
code
of
my
application
and
I
also
have
access
to
the
CTA
dashboard,,
so
to
begin,
with,
I
am
going
to
show
you
what
are
the
components
that
I
need,
not
suitable
to
integrate?
My
application,,
you
can
obtain
a
service
as
you
know,,
as
I
mentioned,.
B
It
is
a
service
that
has
business
support,
but
also
has
workshops
of
how
many
applications
of
how
many
maximum
users
that
can
access
the
free
10
has.
In
fact,
very
much
capacity
can
be
expired
for
applications
in
production
and
what
I
have
here
is
a
user
account
with
an
application.
In
this
case,
this
application
is
for
conference
demo
sp.
a
is
basically
the
client
or
the
client
application
that
is
going
to
request
to
authenticate
the
users
with
respect
to
them.
B
The
important
thing
about
the
configuration
of
this
application
is
simply
the
client
id.
When
the
application
starts,
the
user
login
process,
it
is
going
to
send
the
client
id
and
a
secret.
The
secret
is
set
as
you
can't
access
it,
because
it's
safely
stored
and
it's
going
to
ask
for
authentication
on
this
domain
and
you
choose.
It
allows
you
to
set
up
perfectly
name:
domains
domain
name,
servers
of
any
dotcom
dotcom
domain,
whatever
you
want,
but
that
requires
additional
configuration,
and
you
can
also
ask
how
it's
going
to
be
done.
B
In
this
case,,
the
authentication
that
I
am
going
to
do
is
a
flow
of
messages
based
on
the
authorization
code.
What.
This
implies
is
that
the
application
will
request
oct
to
do
the
login
8a
to
send
an
authorization
code
to
the
application,
and
with
that
The
user
authentication
is
going
to
start
and
once
the
user
authentication
is
finished,,
a
jason
web
token
and
an
identity
token
are
generated.
That
will
remain
in
the
sp.a
application
in
this
case
and
finally,
I
need
to
configure
how
it
goes
to
perform
a
login.
B
Then
the
login
will
be
done
by
my
server.
That
is
running
on
my
machine
locally
on
port
4200,
because
this
and
running
with
110-
and
it
is
a
preferred
port
for
our
technology
and
I-
need
to
configure
the
login
callback,
which
in
this
case
is
the
function
to
be
called.
This
is
a
standard.
Almost
all
identity
solutions
require
a
callback
function
and
who
initiates
the
login
In
this
case,
then,.
B
In
addition
to
this
application,
ok,,
it
works
as
a
user
directory,.
So
here
I
will
have
three
users.
In
this
case,.
There
are
three
identities
with
my
email:
addresses:,
an
administrator
user,,
a
speaker
user,
and
a
user
I
attended,
in
this
case,
assistant,
speaker
and
administrator,
that
in
this
case,
from
this
same
account,
and
these
users
belong
to
some
groups.
That
in
this
case,
are
equivalent
to
the
roles.
B
B
Finally,
opt
you
need
to
identify
an
authorization
server
as
well
as
the
server
that
generates
the
tokens,
and
this
server
is
configured
here
within
applications,,
sorry,
security,
api,
and,
in
this
case
I
have
an
authorization,
server
called
conference
conference
that
it
has
a
uri.
This
aura
was
important,
because
this
is
the
one
I
need
to
assign
to
my
micro
profile
environment.
So
it
knows
who
is
generating
the
tokens.
It
has
an
audience
in
terms
of
open
air
and
connect.
The
audience
is
the
users
or
the
application
service
that
is
interested
in
authenticating.
B
Those
tokens
I
can
validate
this
audience
c
Every
time
I
receive
a
token,
and
the
important
thing
is
that
when
I
enter
the
configuration,
it
is
a
note
of
this
service.
I
look
here
in
the
configuration
of
my
klein
or
affirmations
that
I
am
generating
3
claims,
the
psuv
and
the
loop
n,
which
for
practical
purposes,
are
the
identification
of
the
user.
The
vpn
in
this
case
this
is
a
standard
click
that
micro
profile
and
doublet
requires
for
user
profiling.
In
this
case,
it
corresponds
to
the
user
id
within
opt.
This
is
an
autogenerated
idea.
B
The
groups
that
correspond
to
the
same
groups
of
opt
but
opt
does
not
generate
this
plane.
Within
the
token
I
have
to
assign
this
default
configuration
and
the
psuv,
which
is
basically
an
alias
for
another
identity
or
soviet
of
the
user.
So
now
that
we
have
seen
the
opt
configuration,
let's
look
at
my
configuration
application.
In
this
case,
my
application
is
a
simple
project
of,
and
that's
it
it's
a
project
made
in.
If
you
are
going
to
fall,
put
xml
of
the
roots
module,
you
will
see
that
I
have
configur
each
two
dependencies.
B
A
jakarta
dependency
in
this
case
I
am
using
a
9.10,
which
is
the
current
version
of
the
technology,
and
I
am
looking
forward
to
micro
profile
4.1,
which
is
the
current
version
supported
within
the
payara
platform,
and
I
am
also
here
confirming
the
version
of
payara
that
I
am
going
to
use.
At
this
moment,
I
am
using
the
community
version.
5.20
21.7
and
I
am
defining
other
configuration
sources.
So
within
my
sp.a
application
that
is
here
and
defined
within
the
conference,
app
folder,
you
can
see
it
is
the
angular
application.
B
I
will
not
go
into
so
much
detail,
but
for
those
interested
in
the
integration
configuration
connects
is
within
this,
the
correct
term
is
configuration,
object
called
octave.
In
this
case
it
is
a
jason
that
contains
the
client
id
of
the
sp.a
application.
That
I
defined
within
octane
in
this
case
would
be
this
one
here,
because,
james
to
pair,
we
understand
this
level
of
client
an
isr
or
the
authorization
service
that
is
going
to
generate
or
is
going
to
issue
these
tokens.
B
In
this
case,
this
is
the
time
of
the
conference
server
that
I
showed
you
a
time
to
read
address,
and
in
this
case
it
is
the
login
callback
that
rl
state
is
standard
and
has
to
be
authorized
within
the
minutes,
because
if
they
do
not
opt
it
will
not
redirect
the
request
for
security
reasons
schoeps.
This
is
part
of
the
open
haiti
connect
standard
and
allows
me
to
define
what
will
be
the
user
identity
information
that
will
generate
the
identity.
B
B
B
Another
has
integrations
with
many
free
and
angular
script
and
view
many
of
them
have
already
standardized
libraries,
so
that
one
does
not
have
to
rewrite
write
all
the
necessary
scripts,
simply
one
use
of
the
components
of
what
one
should
prefer
and
with
that
you
are
integrating
the
application.
So
the
microservices
in
this
case
are
going
to
use
micro
profile
doublet
to
integrate
with
the
authorization
server
how
it
works.
B
B
This
is
an
exercise
proprietary
class,
since
they
laugh
that
it
is
the
jakarta
technology
that
I
am
using
to
expose
services
and
I
can
use
the
method.
A
text
was
criticized
and
whether
to
use
in
roll
these
jakarta
standards
in
to
check
if
a
user
belongs
to
a
role
or
you
can
also
inject
the
specific
plane.
A
token
assertion.
In
this
case,
I'm
saying
I'm
going
to
enter
the
groups
inside
a
set
of
strings,
and
I
can
use
this
object
instead
of
this
validation
to
see
if
a
user
belongs
to
a
role.
B
All
the
data
from
identities
that
come
within
the
access
token
within
the
already
web
token
can
be
injected
from
this
part
of
the
jay
doublet
specification
to
access
That
information.
How
do
you
configure
this
application
to
integrate
with
the
authorization
server?
First
within
the
configuration
class
I
am
going
to
use
the
conflicting
login
annotation
and
say
my
authentication
method
is
going
to
be
micro,
producer,
jay,
w
and
then
I
have
to
configure
three
configuration
properties.
B
Micro
profile
trusts
that
this
is
a
standard
within
the
technology
that
allows
me
to
define
configuration
variables
and
I
need,
in
this
case,
for
example,
I
am
doing
it
within
this
standard
file,
which
is
macro
profile
with
field
properties.
I
am
going
to
define
the
location
where
it
exists,
the
public
key
that
will
be
used
to
decrypt
the
token.
In
this
case
this
corresponds
to
my
authorization
servers
which
is
in
this
location
and
then
follows
the
string
big
one
keys.
B
This
is
standard
this
miami
get
or
will
it
allow
me
to
access
a
file
jay
w?
That's
a
standard
jason
web
tokens
where
the
public
keys
that
were
used
to
encrypt
the
token
are
encrypted
and
I
can
access
them.
So
my
micro
profile
server
will
remotely
obtain
these
keys
and
the
pauses
to
decrypt
the
token
and
validate
it.
I
need
to
tell
it
what
my
token
issuer
is
going
to
be.
B
how
it
is
configured,
no
cta
and
finally,
the
audience.
This
is
optional.
These
two
are
mandatory
technology
in
the
audience.
It
is
an
additional
validation
that
it
does
not
hurt
to
place
it,
because
with
this
we
already
have
the
integration.
So
before
showing
my
service,
then
I
will
show
how
the
speaker
service
is
configured.
Basically,
it
uses,
our
micro
will
fail,
plugin
to
start
for
micro.
In
this
case,
it
is
configured
to
run
with
the
current
version.
B
5.20,
21.7
and
I
am
saying:
well,
you
are
going
to
deploy
to
the
place
that
is
generating
and
you
are
going
to
start
it
in
the
port
that
I
configure
is
80
81
for
speaker
and
80
80,
88,
81,
pérez,
piquero
and
88
82
for
the
service
session
io.
So
we
are
going
to
buy
some
time.
We
are
going
to
start
my
three
services
manage
components
in
this
case
the
speaker
and
in
this
case
the
session.
B
Is
going
to
use
a
bit
of
time
to
start
to
get
it
right?
So
my
speaker
service
is
a
simple
service.
Persistence
is
being
used
by
jp
a
in
this
case.
If
I
go
here
to
springs,
I
go
to
and
archived
persistence.
I
wanted
mlb,
although
I
am
defining
a
persistence
unit
and
I
am
creating
the
tables
I
need
to.
Data
will
be
saved
with
simple
jp
entities
and
in
this
case
I
only
have
one
entity
and
it
is
called
speaker
by
default.
Payara's
default
data
source
is
an
embedded
h,
2
database.
B
It
is
in
memory.
I
am
not
connecting
to
any
database,
because
this
is
for
demonstration
purposes
and
the
api
integration
will
basically
be
implemented
with
jacques
rs,
as
I
showed
you.
I
am
defining
some
thugs
that
will
use
my
applications
and,
in
this
case,
by
axis
Example
to
accept
a
speaker,.
Only
an
administrator
can
do
it
in
this
case,
because,
as
you
can
see
here,
the
role
checked
only
allows
me
to
configure
what
is
allowed
for
an
administrator,.
B
You
can
also
use
the
allow
annotation
or
the
one
that
allows
me
to
define,
regardless
of
what
role
an
administrator,
has.
user,
but
it
must
be
indicated
you
can
call
this
method.
My
attention
service,
on
the
other
hand,
is
basically
the
same.
It
has
the
same
configuration
that
is
configured
to
use
jason
web
token.
You
will
see
here
in
the
app
and
that
in
this
case
we
have
two
in
points
one
for
session
and
one
to
register.
Attendees
and
the
session
service
will
also
have
operations.
B
Configured
with
protection
under
specific
roles
are
back
as
I
had
shown
in
the
slide,
and
it
will
work
in
a
similar
way
if
boyacá
registration
risso
they
go.
Let's
see.
Also
in
this
case
you
can
also
inject.
This
is
a
standard,
jakarta
technique
and
you
can
inject
an
object
principal,
which
is
the
one
that
contains
the
username
and
the
identity
of
the
user,
because,
for
example,
when
I
want
to
make
a
registration,
if
the
user
is
authenticated,
I
can
simply
call
main
dot
get
game,
and
with
this
I
have
the
identity
of
the
user.
B
In
this
case,
main
dot,
get
name
is
going
to
get
me
the
value
of
the
pn
assertion
that
comes
in
the
token
already
doublet.
Well
then,
having
seen
all
this,
we
are
going
to
show
the
running
application
in
this
case,
as
I
am
already
authenticated
in
opta
we
are
going
to
open
a
private
window.
Now
we
can
do
authentication
from
scratch.
In
this
case,
we
are
going
to
run
at
4,200
here.
B
I
have
my
conference
application
I
have
no
access
to
anything
as
long
as
I
have
not
succeeded,
so
you
can
start
the
login
and
what
the
angular
opt
prize
will
do
is
redirect
me
to
the
page,
opt
authentication.
This
can
be
configured,
however,
you
like
we
are
going
to
use
the
credentials
of
one
of
the
example
users
you
created
ee
in
this
case.
I
have
them
saved
here
from
this
and
enter.
A
B
B
Going
to
enter-
and
they
see
that
already
here-
half
well
access
I
already
have.
Basically
the
token
is
saved
within
the
client
and
I
can
now
call
microservices.
For
example,
if
I
enter
the
speakers
page,
you
will
see
here
so
that
I
can
see
the
speakers
and
below,
okay,.
Let's
go
here
to
reload,
have
access,,
then
here
we
can
look
inside
the
call
speakers,
200,
ok,
I
called
my
service,
ok,,
and
how
can
you
see
it
in
this
case,
before
the
page
is
this?
Is
where
Although?
B
B
B
Freak
and
ats
and
xp
are
zeide
timestamps
in
our
case
I,
don't
remember
we
that
it
is
basically
a
standard
statement
of
open
haití
that
was
generated
by
opta
in
the
scouts.
The
psuv,
as
we
already
looked
at
it
in
this
case,
corresponds
to
my
email
address,
and
the
pn
in
this
case
corresponds
to
the
identity
of
our
en
In
this
case,.
B
It
would
be
this
information
and
the
groups
to
which
it
corresponds,,
since
the
user
indicating
the
student
and
finally,
the
third
part
of
the
touch,,
which
is
this
one
here,,
it
can
be
seen
that
each
part
corresponds
in
one
color,
the
private
key
with
which
the
token
was
encrypted
and
with
which
I
can
verify,.
In
this
case,
it
is
hidden
here,
because
the
idea
is
to
do
the
validation
separately
so
going
back
to
the
application.
I
can
see
that
I
did
one
here
and
I
get
the
token
and
I
have
the
opportunities,.
For
example.
B
I
cannot
accept
a
speaker,
because
in
this
case
this
user
does
not
have
a
speaker
role,
but,
for
example,
I
am
going
to
try
to
register
a
speaker
as
part
of
payara
services
limited
in
this
case,
and
if
it
allowed
me
to
do
the
operation
in
in
this
case,
if
boyacá
the
operation
that
was
called
in
this
case
was
post
speaker,
they
will
see
what
it
was.
It
allowed
me
to
return
a
2
0
1.
If
I
try
to
accept
myself
with
a
speaker.
B
I
am
not
authorized
to
accept
speakers
because
and
the
role
authorization
validation
in
jay
w
returned
a
403
prohibited
because
standard
application
development
would
not
hide
this
vote,
do
not
disable
it,
and
the
idea
is
that
one
would
not
see
this,
but
there
should
always
be
protection.
Of.
These
operations,.
A
B
Fine,
then
The
demo
ends
and
we
move
on
to
questions.
Ok,
well,.
So,
as
you
can
see,,
the
resources
are
basically
protected..
If
I
go
to
my
application,
for
example,.
The
way
in
which
speakers
are
accepted,.
That
method
has
to
be
configured
within
my
speaker,
service,
and
in
this
case,
if
I
go
here,
it
would
be
up
and
speaker
research,
and
here
it
is
accept
speaker.
As
you
see
it
can
only
be
an
administrator
user
and
to
do
this
test
easily
I,
simply
log
out.
B
B
Perfect
without
dick
speakers
and
I
try
to
accept
the
speaker,
and
you
will
see
that
the
speaker
was
automatically
accepted,
because
if
it
had
the
role,
then
the
configuration
is
very
simple.
They
see
that
there
are
zero
token
validation
codes
within
my
service,
literally
all
that
delegation
that
validation
is
being
done
by
doublet
micro
profile
technology.
B
The
only
thing
he
needs
to
know
is
these
three
or
well
necessarily
these
two
information,
the
location
of
the
public
key
and
the
sender
of
the
token,
and
he
takes
care
of
the
rest
and
it
doesn't
hurt
to
do
the
validation
of
the
audience.
For
example,
there
are
these
configuration
variables
they
can
be
inside
this
file.
They
can
be
inside
an
environment,
property
or
a
perote
variable,
a
property
of
standard,
jrm
settings
or
an
environment
variable.
B
That
allows
me
if
I'm
running
the
tests
in
a
docker
container
still
tie
it
as
term
to
a
config
map
to
a
secrets
directory
or
basically
pass
those
environment
variables
in
the
image
everywhere
or
in
the
file
call
config
from
the
whole
deployment
or
what
who
want
to
use
highly
flexible.
Then
you
can
finish
in
conclusion.
B
Note:
it
allows
you
to
delegate
the
administration
and
authentication
of
users
at
no
time
my
application
has
worried
about,
registering
and
increases
to
a
ministry
authenticating
these
users,
all
that
is
delegated
the
authentication
flow,
is
simplified
in
the
applications,
because
all
this
functionality
is
outsourced
removes
unnecessary
complexity.
Microservices
microservices
are
only
concerned
with
business
logic,
no
user,
identity
management
and,
finally,
eclipse
micrograph
allows
connecting
to
an
existing
domain,
adopts
location
and
issuer
via
configuration
property.
B
Only
all
that
is
needed
removes
the
concern
about
token
enable
algorithms
all
standard
variations,
because
it
follows
a
standard
in
that
word
and
focuses
on
configuring
security
constraints
based
on
roles.
The
only
thing
I
have
to
say
in
application
code
is
which
roles
have
access
to
which
methods
and
that's
it
I,
don't
have
to
ask
my
mind
to
worry
about
anything
else.
So
now,
let's
go
to
the
questions.
B
That
aspect
the
access
touches,
because
that
is
based
on
open
technology,
air
and
access
touches
by
default
have
a
short
d
time:
e
life
generally,
a
few
minutes.
Minimum
30
minutes
maximum
I
think
the
recommended
4
hours
4
to
8
hours
when
a
token
expires,
open
aid
technology
and
indicates
that
you
must
generate
a
refresh
token
to
not
really
tempt
the
user
that
touch
of
refresh
along
with
What.
B
You
request
from
the
issuing
server
in
this
case
would
be
because
the
application
chooses
in
this
case
and
the
issuing
server
will
bat
and
allow
you
to
generate
a
refresh
token
that
you
are
going
to
use
to
regenerate
the
access
token
and
basically
at
the
level
of
lledó
blood
that
is
not
You
have
to
worry
more,
that
it
is
automatic,
because
the
one
who
generates
the
token,
that
is,
the
one
who
sends
the
token,
is
the
sp.a
application.
In.
This
case,,
the
ok
library,
is
here.
B
I
fixed
where
that
configuration
is
done,
but
it
must
be
within
the
settings
environment,
but
almost
all
identity
platforms
allow
you
to
flexibly
configure
the
time
due
to
a
token,
however,,
as
I
told
you
about
the
recommendations,.
The
token
must
be
always
or
must
have
a
short
lifetime,
and
the
refresh
token
strategy
must
always
be
used..
You
can
easily
see
how
to
obtain
refresh
stock
in,
for.
B
Minutes
are
very
short
times
because,
ideally
they
are
allowed
is
for
integrations
with
services,
so
the
longest,
in
fact
they
recommend,
is
four
hours
but
well,
there
is
no
update,
my
concept
of
nights.
Even
the
time
should
already
be
lower,
but
the
token
regeneration
configuration
should
always
be
done
using
a
refresh
token,
and
since
you
have
all
the
documentation
on
how
to
do
this
for
micro
profile
level,
this
is
transparent,
because
what
you
will
always
receive
is
a
valid
token
If.
He
touches
it,.
A
B
The
micro
profit
properties
allows
you
to
define
or
the
mark,
but
missing
properties
allow
you
to
define
that
the
server
will
authenticate
the
touch
it
will
validate
the
token
against
the
issuer.
The
ron
is
in
micro
profile.
It
will
always
assume
that
the
token
is
delivered
to
you
who
generates
the
token
the
issuer
in
the
communication
flow
in
this
case,
who
generates
the
token,
is
the
sp.a
application
as
it
generates
it.
Every
time
I
authenticate
myself.
B
The
issuer
application
asks
them
to
adopt
this
use
that
to
authenticate
general
of
a
token
in
the
name
of
whom,
in
the
name,
the
issuer
of,
in
this
case,
the
conference
application.
A
ok
I
will
give
you
a
token
now
separately.
I
am
going
to
call
a
service
and
I
am
going
to
send
it
the
token.
In
this
case
it
would
be
like
this
I
am
going
to
send
it
e
l
token,
as
part
of
the
http
header
in
this
case,
and
the
validation
is
done
on
behalf
or
is
done
directly
with
the
issuer.
B
The
service
in
this
case,
which
is
the
own
micro
environment,
is
going
to
ask
the
octa.
They
gave
me
this
token
that
corresponds
to
the
user
fabio
tourism.
Is
he
who
says
to
do
if
the
token
is
valid,
so
the
key
corresponds
to
if
it
is
encrypted.
It
has
not
been
altered,
because
the
important
thing
is
valid,
because
the
touch
should
not
be
altered.
Cxi
a
ok,
perfect.
Well,
tell
me,
then,
who
used
javier
tourís
or
has
these
groups
or
belongs
to
these
groups
that
correspond
to
these
roles,
etc.
etc.
ready,?
B
I'll
take
care
of
the
rest,,
but
the
generation
of
the
token
is
always
done
by
the
workflow,
which,
in
this
case,
as
I,
showed
you,
corresponds
to
an
authorization
code
flow,
that
's
it..
Basically,
it
is
part
of
the
open
haiti
connect
standard,.
It
indicates
that
the
authorization
flow
starts
with
an
sp.a
application,.
In
this
case,
an
application
is
already
created
e
by
a
mobile
application
that
uses
a
test.
B
Key-By-
code
exchange
and
the
technology
says
that
basically,
in
this
case,
the
issuer
and
the
sp.a
application
speak
multiple
times
from
a
standard
url
that
are
well
defined
in
the
documentation
of
pity
and
that
one
can
parameterize
but
words
more
words,
less.
The
only
thing
that
matters
is
the
idea
of
the
client,
because
with
that
I
am
telling
ok,
this
application
can
request
tokens.
I,
don't
know
if
that
answers
the
question
in
our
practical
way.
Ok,
good,
ready
and
As
I
will
show
you,.
The
customer
leader
is
configured
to
answer.
The
questions.
B
B
that
handed
it
to
the
octave
module
config
when
it
imported
here
which
opts
I
have
to
import
a
provider.
This
is
basically
angular
techniques
and
he
passed
him.
The
configuration
object
and
he
is
in
charge
of
reconfiguring
opt
accordingly.
He
got
all
this
that
you
can
I'm
showing
it.
You
can
do
it
as
simple
and
pure
and
already
script,
but
you
have
to
code
all
the
calls
and
how
to
handle
all
the
authentication.
Judging
what
which
is
basically
reinventing
the
wheel,,
which
is
necessary,
well,.
A
B
Is
completely
free,
as
I
said
no
I
have,,
as
is
the
word,
information,
that
is,
I
am
not,.
I
am
linked
to
the
company
in
any
way,.
He
used
the
services
as
an
observer.,
partial
or
impartial
adorer.
In
this
case
it
is
completely
free,
but
the
idea
is
that
you
too,
if
you
know
another
technology
such
as
kick
loto
out,
ciro
perfectly
follow
the
same
guidelines.
B
B
B
B
If
you
already
contract
with
ok,,
they
hire
you
a
service
tier
where
you
can
attend
to
that
load,.
There
is
no
problem.
ema,,
but
if
your
application,
for
example,
has
10,100
up
to
a
thousand
users
per
second,,
there
would
be
no
problem,.
You
can
set
up
the
company
because
you
expect
a
low
load
and
any
environment
in
Oman,
Jakarta
and
Maiker
Profile
supports
that
load
and
you
don't
have
to
worry
so
much
about
the
infrastructure.
word
plus
word
minus
the
printer.
It
depends
on
opts,
however.