►
From YouTube: XAFers Community Standup. XAF Security System
Description
Click Here to Subscribe: http://xaf.life/35
Websites:
https://xafmarin.com/
https://www.xafers.training/
http://xafersweekly.com/
Facebook Group
http://xaf.life/4g
A
All
right,
I
believe,
we're
live,
people
are
still
joining
in,
so
I'm
gonna
admit
them,
and
then
we
get
this
rolling.
Thank
you
guys
for
joining
in.
As
always,
I
really
amazed
of
everyone
who
spent
his
thursday
morning
night.
Whatever
is
in
your
part
of
the
world,
just
to
talk
with
us
about
south
place
or
xpo
and
our
personal
products,
everything
we
do
and
like
this
is
the
suffer
community
stand
up.
We
meet
the
second
thursday
of
every
month
to
discuss
about
south
where
he
has
knew
himself
what
is
coming
today.
A
We
have
a
really
special
surprise,
especially
we
will
be
discussing
the
road
map
of
south
in
2021
and
we,
after
that,
we're
going
to
dive
in
deep
on
the
security
system
that
is
completely
comprehensive
and
really
nice
role-based
control,
for
not
only
but
for
net
applications
in
general.
So
with
me,
right
here
is
a
dave,
a
devex
reception
for
yamachan,
danish
soft
pms
and
ho
developers
mvp.
So
I
will
allow
them,
even
if
I
know
that
everybody
must
probably
already
know
who
they
are
to
introduce
themselves
and
then
we
go
from
there.
B
Whoever
going
to
start
yeah,
I'm
going
first,
so
my
name
is
jochio
heda,
I'm
from
el
salvador,
I'm
a
devexpress,
mvp
and
basically
dotnet
is
my
hobby
and
my
work.
So
if
you
have
any
doubts
guys
regarding
saf
net
xporini.net,
just
send
us
an
email
so
dave.
It's
your
turn.
C
Yep
dave
from
llamachan
technology
we're
located
up
here
in
canada,
been
using
xcf
since
it
was
released
back
in
2007-2008.
We
do
consulting
training,
custom
development,
all
that
fun
stuff
and
happy
to
be
here.
Part
of
this
community
dennis.
A
Perfect
so
again,
as
always,
I
encourage
everyone
to
join
the
community.
We
have
our
meetup,
where
we
do
this
event
segment
center
every
month,
but
we
also
have
our
facebook
group
where
we
can
post
links.
We
can
share,
ask
questions.
We
have
a
twitter,
so
we
can
follow
the
dev
express
staff
official
account
where
it
has
all
the
new
announcements
and
everything
that
is
going
on
or
linkedin
group
or
gear.
We
are
in
every
platform,
so
please
join.
A
There
are
a
lot
of
suffer
here
willing
to
help.
There
is
a
big
power
in
community.
I
believe
that
you
cannot
be
successful
without
joining
the
community
and
without
growing
with
them,
and
today
we
are
going
to
again
discuss
about
the
soft
security
system.
Soft
security
system
is
really
nice,
really
comprehensive
and
work
for
every
the
net
core
or
the
net
frameworks.
A
This
is
the
tentative
agenda
where
we
already
did
the
introductions
and
then
in
the
announcement
is
pretty
much
we're
gonna
talk
about
the
saffron
map
that
then
it
will
right
now
discuss,
and
this
is
a
great
time
guys,
so
you
guys
give
your
feedback
a
tell
us.
What
do
you
like?
What
is
coming?
What
do
you
don't
see
that
you
already
need,
then
dave
will
give
a
quick
introduction
of
the
sub
security
system
and
then
we're
going
to
do
some
we're
going
to
show
some
demos
about
actually
using
the
sub
security
system
in
non-staff
app.
A
Then
we
can
discuss
about
identity
providers
in
facebook,
using
google
identity
server
and,
as
always,
we
encourage
everyone
to
ask
as
many
questions
as
possible.
This
is
a
great
place
where
we
have
a
lot
of
people
passionate
about
stuff,
that
you
can
actually
pick
their
brain.
Give
suggestions,
give
recommendations
and
pretty
much
enjoy
the
talk.
This
is
what
we
like.
So
let's
have
fun.
So
with
that
one
dennis,
I'm
gonna
pass
this
to
you.
This
is
the
saffron
map.
Not
sure.
Do
you
wanna
check
your
screen
or
yeah?
D
D
Okay,
thank
you
jose.
I
want
to
make
a
quick
overview
of
our
plans
for
2021
and
before
I
do
this,
I
just
want
to
remind
that.
We
have
a
team
blog.
You
can
find
it
on
dxpress.com
blogs
here
we
post
our
development
news,
some
tips
and
tricks.
D
D
D
Also,
some
core
futures
features
and
some
blazer
specific
features
like
javascript
and
css
isolation.
Also
new
libraries
like
for
authentication
also,
of
course,
performance
and
debugging
enhancements,
etc,
and
hopefully,
later
this
year
we
will
move
from
the
rest
like
safe
assemblies
to
0.95,
okay
for
blazer.
D
D
Of
course,
we
will
support
more
typical
modules
that
many
many
of
you
left
from
wind
farms
and
web
phones,
for
example
our
popular
module
that
allows
you
to
edit
rich
text
documents.
D
D
In
this
regard,
we
hope
to
use
native
blazer
schedule
control
and
we
already
migrated
this
cross
platform
library,
dual
express
dot,
express,
app
dot
schedule.
We
migrated
it
to
dotnet
standard
for
now.
It's
also
useful
for
some
advanced
scenarios.
D
D
We
also
support
more
property
editors
based
on
customer,
the
most
popular
customer
requests.
First
of
all,
we
want
to
enhance
our
car
property
editor
to.
D
D
D
D
S4
char
chart
build
grid
list
editors.
We
we
think
that
we
will
decide
on
them
at
the
end
of
this
year
because,
as
I
noted
earlier,
dashboards
models
will
support
many
scenarios.
D
But
if
you
require
these
features
right
away,
you
can
already,
as
you
probably
know,
you
can
already
add
them-
by
implementing
a
custom
list.
Editor
a
custom
view
item
property
editor.
So
it's
the
same
standard
procedure
as
for
wind
forms
and
web
phones.
When
you
have
some
standard,
devexpress
or
third-party
control,
be
it
a
javascript,
control
or
native
laser
control,
and
you
can
add
whatever
you
need
in,
except
because
it's
fully
extendable.
D
If
you
remember
our
roadmap
survey,
we
asked
about
the
most
popular
scenarios
and
we
hope
to
implement
some
of
them
in
our
solution.
For
example,
we
want
to
make
it
possible
to
quickly
create
a
applications
that
use
security
model
module
and
that
require
microsoft,
google
or
any
other
external
authentication
providers.
We
also
want
to
make
it
easier
for
users
to
create
winforms
and
blazer
dot
net
5
applications
at
the
same
time,
because,
as
you
know,
currently,
we
have
only
two
separate
project
templates
for
this.
D
D
D
Also,
it
allows
you
to
build
filters
from
typed
api,
using
name
off
and
some
other
features,
but
it's
less
convenient
than
using
link
you
and
this
new
api.
We
added
new
method
from
lambda.
It
allows
you
to
create
strongly
typed
or
type
safe
criteria,
using
link
you,
for
example.
Here
you
can
see
a
simple
example
here.
We
have
a
comparison.
D
A
link,
your
expression,
and
it
doesn't
matter
how
you
change
your
date,
property
name
further.
You
will
always
have
up-to-date
filter.
D
A
Nice,
nice-
I
didn't
want
to
interrupt,
but
I
have
a
lot
of
things
that
I
want
to
add
and
also
dennis.
Please
check
the
chat.
There
are
a
few
questions
for
you
there,
but
I
will
say
my
favorites
and
then
josh
you
can
expand
or
dave
or
anyone
from
the
community.
I
would
love
to
hear
their
opinions
criteria
operator
from
london.
Does
that
that
so
nice
that
sony
does
again.
A
I
love
that
one.
The
net
five
that
we
can
do
is
css
isolation.
That's
also
a
really
big
thing
that
I
have
been
waiting
for.
We
have
a
lot
of
laser
components,
so
it
would
be
really
nice
to
have
the
css
right
beside
that
component
action
container
view
items,
so
we
have
tried
to
put
the
action
inside
the
little
view,
following
the
the
same
approach
that
we
use
on
windows
and
web
and
now
to
be
able
to
do
it
again
in
blazer.
That's
amazing,
dashboard,
scheduler.
A
Those
are
models
that
a
lot
of
people
are
already
one
and
even
if
we
could
integrate
it,
that
comes
out
of
the
box
is
really
nice,
because
now
we
can
save
that
dashboard
definition
in
the
database
before.
If
you
want
to
do
that,
you
have
to
go
yourself
to
the
database,
create
the
table,
create
the
the
query
to
save
that
and
then
return
the
retrieve
the
xml
localization
has
been
asked
a
lot
of
time.
A
lot
of
people
is
asking
that's
a
big
one,
big
one,
big
one
that
everybody
needs.
A
B
Okay,
so
is
my
time
for
the
two
cents.
Actually,
the
one
that
I
like
the
most
here
is
the
to
be
able
to
create
criteria
from
lambda,
because
then
you
will
avoid
magic
strings.
That
is
something
that
we
tell
a
lot
to
our
students
like
okay,
try
to
avoid
magic
strings,
try
to
use
name
off.
That
was
something
new
like
two
versions
ago
in
but
in
dot
net
in
general.
B
So
for
me,
that's
the
my
favorite
one
and
I
don't
know
dennis
if
you're
going
to
include
in
the
documentation
the
other
side
when
you
get
the
lambda
from
a
criteria
operator,
because
I
think
it
was
not
documented,
it
was
open
in
some
examples.
You
can
see
it,
but
I
don't
think
it's
in
the
documentation
actually.
B
Oh
great,
so
I
will
take
a
look
to
that.
So
javier
is
the
time
for
the
demos
or
it's
not
time
yet
not.
A
D
Grids,
I
can
tell
you
the
exit
date
when
it
when
it's
added
to
blazer
ui,
but
it's
for
sure
important
functionality
for
any
business
application,
and
it
will
eventually
be
there
and
currently,
you
can
already
implement
this
using
reports.
Our
blazer
team
has
an
example
that
has
some
code
that
you
can
plug
in
using
a
view
controller,
an
action,
so
I
can
send
a
link
to
the
chat.
A
Yeah,
a
few
of
the
things
that
we
are
talking
about.
I
put
it
here
in
the
in
the
link
for
the
community
post
about,
for
example,
changing
the
pop-up
windows
base.
There
is
a
link
here
how
to
show
the
login
form,
so
there
are
a
lot
of
here
articles
about
the
game
doing
those
workarounds
while
we
get
there
with
the
more
official
implementation
uses
templates
in
the
grid
column
chooser
inside
laser,
and
I'm
seeing
a
john
paul
asking,
if
is
the
grid,
can't
support
context
menu
right
now,.
D
D
D
A
Nice
all
right,
I
think
that,
with
that
we
are
trying
to
start
going
through
the
main
topic
of
the
today.
That
is
soft
security
system.
So
they
will
give
a
quick
introduction
about
the
solution,
the
security
system
in
general
and
then
we're
going
to
start
showing
a
few
demos.
C
Let
me
share
my
screen
too.
It
changes
every
time
I
zoom
which
screen
it
is
there.
We
go
okay,
so
we're
talking
about
security.
Today,
I'm
gonna
start
the
conversation
off
of
the
basic
demo
built
right
into
xaf
and
the
other
guys
will
talk
about
how
to
take
that
and
put
it
into
other
non-xaf
applications
as
well,
which
is
really
kind
of
cool.
C
So
I
created
a
fairly
straightforward,
registered
forward
xdf
application
using
the
the
project
wizard,
I
included
the
standard
authentication
which
then
brings
in
this
security
strategy
complex
and
the
authentication
standard
is
part
of
my
part
of
my
solution
and
what
that
ends
up
doing
is
giving
you
the
standard,
username
and
password
prompt.
C
First
and
foremost,
the
the
really
cool
thing
that
I've
always
loved
about
the
security
system
is
that
it
is
heavily
customizable.
So
what
comes
out
of
the
box
is
fantastic.
If
you
find
that
there's
a
need
to
refine
it
even
further,
the
whole
api
is
open,
so
you
can,
you
can
modify
with
it
and
work
with
it
as
you
need,
which
is
really
quite
amazing,
so
out
of
the
box.
C
C
Those
are
created
as
part
of
the
database
update
updater.cs
again,
you
won't,
if
you
don't
want
them,
pull
them
out,
but
at
least
gets
you
started.
C
So
these
users
are
from
the
permission
policy,
user
and
the
roles
or
permission
policy
role,
classes
that
are
included
as
part
of
the
base
implementation.
They
implement
things
like
the
I
permission
policy
rule.
So
if
you
want
to
do
your
own
custom
uses
and
roles,
you
can
go
that
deep
and
there's
a
we'll
talk
about
that
quickly.
After,
but
let's
have
a
look
at
roles.
C
Roles
are
where
the
majority
of
majority
of
your
security
is
defined.
Again,
you
can't
extend
it
further
and
there's
been
a
few
improvements
over
the
last
few
years,
which
are
really
quite
nice.
So,
with
any
rule
you
can
attach
users
when
we
get
into
type
permissions.
We
have
type
permissions
navigation,
permissions
and
denied
actions,
and
these
are
the
navigation.
Permissions
and
denied
actions
are
the
kind
of
newest
additions.
C
Kills
me
every
time,
so,
when
you're
an
administrator,
you
have
full
rights
to
everything.
There's
no!
There's!
No
restrictions
put
in
place
at
all
when
you're
a
non-administrative
user
when
they
uncheck
this
the
options
become
available
to
add
these
type
permissions
navigation
permissions
and
denied
actions
I'll
go
back
to
the
other
users.
So
I
don't
the
other
role.
Sorry,
so
don't
screw
that
one
up,
so
I
have
in
my
application
just
even
idea.
C
C
C
When
I
add
the
contact
one
now,
I
can
specify
permissions
directly
related
to
a
contact
before
we
get
too
deep
into
that.
We
should
decide
whether
or
not
we're
going
to
allow
people
to
access
everything
by
default
or
deny
them
by
default
or
make
them
read-only.
So
this
is
another
another
option.
That's
implemented
fairly
recently,
there's
been
a
few
iterations
of
the
security
system,
but
I
think
by
default
it's
set
to
deny
all
by
default.
So
basically
any
user
that
comes
in
they
have
zero
access.
They're
not
allowed
to
touch
anything.
C
If
you
change
that
to
read
only
okay,
you
can
read,
but
you
can't
write,
you
can't
delete
you
can't
create
new
or
if
you
allow
all
now
you're
saying
they
have
access
to
everything,
we're
going
to
start
revoking
access
depending
on
your
scenario
and
how
tight,
how
big
and
complex
and
how
tight
your
security
needs
to
be.
C
C
C
I
have
nothing
specified
in
here,
so
it's
going
to
default
to
whatever
my
role
was,
which
is
allow
all
by
default,
and
then
I'm
going
to
go
in
and
either
add
member
permissions
or
object
permissions.
So
if
I
want
to
turn
off
an
individual
member,
I'm
going
to
do
that
inside
the
member
permissions
and
what's
really
cool
about
this-
is
that
you
get
into
it's
on
the
wrong
screen.
C
You
get
into
your
role,
you
can
set
it.
You
can
set
up
the
criteria
to
say
yeah.
They
can
read
their
own
driver's
license
number,
but
they're
not
allowed
to
read
other
users
driver's
license
numbers.
C
So
I'm
going
to
turn
off
the
read
on
this
for
all
they
can't
read
their
own
or
anybody
else's.
I
set
the
read
to
deny
the
right
shouldn't
matter
so
build
it
anyway.
C
C
Dennis
did
this
change,
this
used
to
say
content
unavailable
or
whatever
protected
content?
C
Not
there
okay
yeah
fairly
recent.
I
believe
these
were
changed
to
to
different
characters.
I
think
you
can
define
those
characters
in
the
in
the
model
file
as
well,
so
outside
of
that
we've
we've
locked
that
down.
Let's
go
to
log
out,
let's
login.
C
So
those
are
in
the
type
permissions
the
so
we
took
it
down
to
the
individual
member.
You
can
go
down
and
invoke
many
members
based
on
the
same
the
same
rule
set.
So
if
I
put
in
some
criteria
here
that
says
they
can
only
read
their
own
or
that's
not
their
own,
then
I
can
say
not
only
this
member,
but
they
you
know
they're
not
allowed
to
see
their
last
name
either.
C
C
C
So
now,
when
I
log
in
as
as
a
user,
when
I
look
at
contacts,
I
should
only
be
able
to
see
myself
contacts.
C
So
they
can't
see
last
name
now,
of
course,
that's
silly
because
the
you,
the
contact,
is
not
actually
a
user,
so
that
actually
brings
me
to
another
piece
which
we'll
get
to
shortly.
C
So
that's
I
mean
that's
the
basics
of
type
permissions
right,
you're,
you're,
defining
that,
for
this
type
you're
either
allowed
to
read,
allowed
to
write,
create
or
delete.
You
can
go
down
to
the
object
level
and
say
if
it's
this
type
of
object
or
if
the
first
name
starts
with
whatever
they're
not
allowed
to
see
it.
So
you
add
criteria,
and
you
say
if
it
matches
this
criteria
here
are
the
rules
for
the
object
as
a
whole.
C
If
you
want
to
get
down
more
specific
you're
doing
the
same
thing,
but
now
you
can
apply
which
members
that
applies
to
so
these
type
permissions
give
you.
You
know
the
most
and
robust
flexibility
in
terms
of
defining
those
those
roles.
C
What
we
tend
to
see
is
a
lot
of
people
putting
in
filters
automatically
into
views
into
collection,
lookups
that
type
of
thing
to
say:
hey,
you're,
not
not
allowed
to
look
at
this
and
you're
really
stepping
on
the
toes
of
the
security
system.
You
should
try
to
let
the
security
system
do
as
much
as
you
can
and
then
just
apply
your
little
changes
on
top
of
that
yeah.
That's
right,
navigation,
permissions!
C
The
same
thing
applies
for
denied
actions,
so
here
will
be
my
list
of
actions
and
I
have
one
called
outlaw
locations.
So
if
you're
looking
at
a
contact-
and
you
see
their
list
of
locations,
there's
a
button
there
to
add
all
locations
same
thing-
I
can
turn
that
off
and
then
users
won't
be
able
to
see
that.
C
So
that's
the
basics
of
setting
up
rules.
You
obviously
assign
your
users
to
roles.
There
is
some
complexity
of
having
multiple
users
in
multiple
roles.
C
That
is
not
going
to
be
included
in
this
part
of
the
demo,
but
we
may
talk
about
that
later
on.
We
should
talk
a
little
bit
about
the
underlying
types.
So
when
I
go
and
I
look
at
my
win
application
here
again-
we
use
a
security
strategy
complex
with
the
authentication
standard.
C
There
are
other
authentication
types
down
over
here.
We
have
the
authentication
active
directory.
This
is
particularly
useful
in
a
windows
scenario
where
it
basically
takes
the
logged
in
username
and
applies
that
as
the
as
the
user
and
you
have
the
options
to
automatically
create
that
user
or
have
to
have
it
predefined.
C
You
can
also
create
your
own
authentication
strategies
as
well.
So
if
you
want
to
do
your
oauth
or
something
completely
custom,
you
can
create
your
own
and
then
you're,
just
dragging
it
onto
here
or
defining
it
here
in
the
security
strategy
complex.
This
is
where
the
user
and
role
types
are
defined.
So
over
here
in
our
properties,
we
have
our
role
type,
which
is
our
permission,
policy
role
and
our
user
type,
which
is
permission
policy
user.
C
If
you
need
to
use
custom
security,
users
and
roles.
So
maybe
you
want
to
add,
you
know
first
name,
last
name:
email
to
a
user,
have
them
log
in
and
have
more
information.
C
C
So
normally
do
base
object,
we're
going
to
do
permission,
policy,
user,
okay,
so
normally
this
would
create
a
separate
table
for
my
employee
with
the
additional
fields
to
do
things
in
a
single
table.
We're
going
to
do
a
map
inheritance,
the
parent
table.
So
it's
going
to
store
all
of
my
new
fields
into
that
permission.
Policy
user
table.
C
If
I
can
type
today,
last
name
perfect,
if
you
do
this,
if
you
create
and
extend
the
permission
policy
user
permission
policy
role,
be
aware
that
in
your
updater
updater.cs,
you
need
to
go
back
and
modify
these
pieces
because
they
are
creating.
You
know,
permission
policy
users
and
you
need
to
put
in
your
own
type.
C
C
The
last
thing
we
need
to
do
is
actually
go
into
our
wood
application.
This
is
going
to
change
once
we
get
into
the
blazer
side
of
things
as
the
designers
are
not
going
to
be
included
at
least
not
immediately,
and
what
I
do
is
I'm
just
going
to
build
this
quickly,
build.
C
C
C
C
There
we
go
from
the
wrong
screen
again
there
we
go
so
my
employees
are
here.
These
are
security
users,
just
like
we
had
before,
but
now
I
have
the
options
for
first
name
and
last
name
in
the
back
end,
they're
still
all
being
stored
in
that
permission
policy
user
table,
but
it
gives
me
more
flexibility,
more
options.
C
If
you
want
to
do
that,
so
that's
a
little
bit
more
complex.
It
gives
you
kind
of
the
ultimate
flexibility
you're,
not
relying
on
the
underlying
types.
It's
a
bit
more
work,
but
it
does
give
you
much
more.
C
That's
great
yeah,
we
I
mean
we've
I've
seen
a
couple.
People
do
very
custom
implementations
using
the
interfaces
99
of
the
time.
I
see
people
do
an
extension
of
the
permission,
policy,
user
permission,
policy
role
and
I've
never
seen
anybody
really
have
a
problem
with
that.
So
I'm
glad
to
hear
that's
coming.
C
There's
some
nuances,
some
complexities
in
terms
of
related
objects.
I
won't
really
get
into
details
on
those
at
this
point,
but
there
are,
you
know,
collection,
the
other
one
here
there
are
some
collection
related
and
particularly
aggregated
objects
that
when
they
have
a
a
relationship
type
in
these
type
permissions,
the
security
system
will
make
some
assumptions
for
you
in
terms
of.
If
you
have
the
rights
to
to
read
that
type,
then
the
collection
of
that
object
within
the
you
know,
the
containing
type
will
automatically
link
up.
C
C
So,
by
default
it's
set
to
auto,
there
is
extended
the
extended
auto,
which
is
a
little
bit
slower,
but
does
have,
I
think,
a
little
bit
more
flexibility
and
then
there's
manual
where
you
basically
have
to
define
rules
on
both
sides
of
the
objects
to
to
enforce
those
those
relationships
so
be
aware
that
that
is
there
as
well,
certainly
recommend
reading
some
documentation
on
that.
There
is
the
basic
security
we
can
probably
link
these
after.
So
here's
a
good
article
on
the
security
system
as
a
whole.
C
There
is
another
one
on
permissions
for
aggregate
objects,
associated
objects
and
how
that
works
so
another
great
piece
of
documentation,
and
then
there
is
one
for
when
you're
creating
the
manual
association
permissions.
So
those
are
three
that
we
should
jose.
We
can
link
those
at
the
end
and
and
make
those
available.
They
really
clearly
define
how
the
security
system
works.
In
the
background
and
the
little
nuance
rules.
A
Nice,
hey,
thank
you
dave.
That
was
a
great
great
overview,
a
great
introduction
and
I
wouldn't
call
it
an
introduction.
It
covered
almost
everything
that
we
need
to
to
have
an
account
in
our
security
system
and
definitely
dennis
already
put
the
link
on
the
chat,
but
I
will
probably
add
it
to
a
youtube
video
then
later
on,
so
you
always
also
have
access
to
that
one.
So
I'm
gonna
share
my
screen
for
just
a
second
and
a
few
things
that
I
would
like
to
add
a
day.
The
change
was
in
20.2.1.
C
A
It's
a
better
user
experience.
I
would
say
that
the
protected
content
behavior
before
I
also
want
to
point
out
that
fernando
was
asking
about
some
type
of
a
cloning,
the
permission
or
to
get
it
up
to
speed
quickly
and
one
solution
that
then
it
provides
using
the
clone
module
to
clone
those
objects,
but
also
you
can
also
use
this
example
that
they
express
us
here
or
how
to
use
the
generated
database
updated
code.
So
you
can
just
pretty
much
copy
that
code
into
your
application.
A
On
those
permission,
controls
get
generated
based
in
the
role
that
you
define
in
your
ui.
So
this
is
a
really
nice
solution.
I
actually
have
a
video
on
my
channel
about
this.
I
really
recommend
it.
I
also
want
to
point
out
that
I
have
seen
a
lot
of
software
that
I
have
been
using
for
a
few
years
already
and
they
were
using
the
old
security
system,
user
security
system
troll
and
they
haven't
still
migrated.
A
So
this
is
also
a
great
link
that
they
can
use
to
finally
move
their
own
implementation
to
the
new
approach
that
it
has
a
lot
of
new
advantages.
A
lot
of
new
features
and
one
link
that
I
really
like
is
the
landing
page
from
the
security
systems
right
here
we
have
a
really
nice,
a
visualization
of
how
the
security
system
work
about
the
authorization
part,
the
authentication
part,
and
how
this
is
not
only
for
staff.
A
I
mean
we're
going
to
show
now
a
few
demos
using
soft
security
in
non-stop
app,
but
3dmos
is
a
common
api.
When
you
go
and
check
the
code
that
the
designer
got
generated
for
you
is
actually
doing
the
same
thing
that
we
will
be
doing
now
by,
but
it
makes
it
so
easy
for
you
and
dennis
can
correct
me
if
anger
on,
but
the
security
system
has
more
than
ten
thousand
a
unit
test.
So
definitely
that's
not
something
that
you
want
to
implement
yourself.
A
Certainly,
that
is
a
great
tool
that
you
can
reuse
and
especially
those
that
we
really
like
stuff
pretty
much
every
time
that
I'm
gonna
do
any
type
of
application.
Even
if
it's
not
going
to
result,
I
put
stuff
as
my
back
end,
and
I
just
reuse,
my
my
authorization,
my
authentication,
my
security
thing
and
also
right
here.
There
are
demos,
with
security
implementing
almost
everywhere
that
you
want
in
donating
winforms,
console
web
forms.
Summary
blazer,
nbc,
dev
extreme
so
again,
and
the
demos
that
we
are
going
to
show
is
nothing
is
already
available
for
you.
A
It's
right
there
in
github
just
go.
There
run
it
play
with
it
understanding
and
you
will
see
how
how
comprehensive
and
how
granular
the
security
system
can
be.
So
I'm
going
to
start
with
the
most
simple
of
the
demos,
and
it
will
be
the
console
solution,
and
then
I
will
do
the
win
forms
and
I
will
switch
to
host.
So
he
can
be
a
summary
one.
That
is
a
little
more
comprehensive.
A
So,
let's
just
quickly
review
this,
we
have
a
staff,
application
and
normal
self
application
right
here
that,
let's
quickly
set
it
after
start
project,
unless
that
pretty
much
is
the
same
concept,
that
dave
was
showing
like
with
a
handing
user
and
right
here,
you
can
see
that
all
the
permissions
are
being
created,
navigation,
member
type,
all
the
all
the
good
stuff.
So,
let's
just
run
it
and
then
we'll
see
that
a
we
are
running
a
second
we're.
A
Gonna
have
a
class
that
is
called
a
department
and
then
we're
gonna
have
employee
and
because
we're
an
admin
and
dave
was
explaining.
If
you
have,
that
is
administrative
bullying,
you
have
access
to
everything.
We
can
see
everything
that
we
are
here,
but
if
we
log
off-
and
we
come
back
with
the
user.
A
That
the
user
doesn't
have
access
to
the
department,
so
you
cannot
see,
and
it
has
some
criteria,
because
you
can
see
some
of
the
departments
only
the
research
and
development
department,
that
is
the
the
department
that
they
belong.
So
let's
try
to
see
this
in
the
console
application.
That
is
the
more
simple
example.
A
If
you
see
here
in
the
designer
that
dave
was
showing,
they
already
have
there
and
chat
when
you
do
the
the
wizard
by
default
that
you
select,
I
want
to
add
security,
I'm
going
to
add
the
client
mode.
It
create
all
this
code
behind
the
the
hood
for
you.
So,
let's
see
right
here
we
have
created
an
instance
of
the
authentication
standard.
Then
we're
going
to
select
in
the
security
strategy
complex
and
right
here,
we're
passing
what
are
the
type
of
users
permission?
A
Policy
user
by
visible
is
a
role
that
we're
going
to
use
and
we're
passing
the
authentication
standard
right
here.
We
will
have
another
class
that
is
inheriting
from
permission
policy
user
and
actually
using
that
one
instead
of
permission
policy
usage,
because
the
parameter
that
the
security
strategy
needs
is
user
type,
roll
type
and
the
authentication
base
in
this
case
is
going
to
be
your
authentication
standard
and
that
one-
and
I
want
to
also
point
out
that
the
most
common
approach
is
the
one
who
they
show
about
inheriting
from
a
permission
policy
user.
A
But
you
can
also
implement
all
the
interfaces
that
the
permission
policy
user
provides
and
you
will
have
the
same
functionality
if
you
want
to
do
some
like
a
few
years
now.
We
want
to
try
to
use
this
in
summary
and
we
couldn't
inherit
from
base
object.
We
needed
to
be
only
xpo,
so
we
did
that
instead
of
inheriting
from
permission
policy
users,
we
implemented
all
the
interface
and
here
it
just
for
a
hbo
class
that
could
run
on
summary.
So
after
that,
we
pretty
much
get
a
connection
stream.
A
We
create
a
new
security
space
provider
and
we
pass
our
security
strategy
and
our
connection
stream
creator
users
and
then
in
the
authentication.
We
send
the
one
parameter
and
we
pass
our
username
that
will
be
used
and
the
password
that
we
have
and
pretty
much.
This
part
is
just
to
create
a
text
file
and
pass
the
the
objects
and
the
of
the
employees
and
departments.
A
A
As
long
as
you
understand
all
the
steps
involved
about
auto
integration
and
standard
security
study
and
enrolling
the
windows
restore
version,
you
will
be
able
to
reuse
this
in
any
net
application
any
other
network.
So
it's
just
more
important
about
understanding
how
the
security
system
api
is
working.
You
say
the
file
was
created.
You
can
go
and
read
it.
So,
right
now
pretty
much.
A
A
He
cannot
read
the
department
unless
that
is
the
research
development
department
and
development
firm.
So
again,
all
these
steps
is
always
needed
and
we're
going
to
be
able
to
see
this
today
in
console
in
windows
in
web
in
blazer.
In
summary,
and
actually
jose,
has
a
really
nice
surprise
in
uno
as
well.
So
that's
how
a
most
rich
that
security
system
have
so,
let's
again
close
this
one.
A
If
we
go
to
the
main
form
right
here,
then
we
are
going
to
see
that
right
now
we
are
actually
let
me
see
we're
creating
a
login
form
here.
That
is
going
to
be
able
to
do
that
and
we're
going
to
pass
a
list.
And
if
we
go
to
the
login
form,
then
we
have
the
same
thing:
the
security
strategy
complete
and
we're
going
to
create
the
login
space,
we're
going
to
pass
the
username
the
password
and
do
the
authentication
we're
going
to
set
the
loan
parameter.
A
So
it's
exactly
the
same
kind
of
steps
and
again
this
is
available
already
in
the
landing
page
for
the
security
system,
so
you'll
be
able
to
just
go
there,
download
the
the
projects
and
run
it
I
actually
separated.
So
I
have
all
the
projects.
A
With
the
same,
if
you
see
we
have
the
same
sub
solution
here
included
together.
So
I
will
also
put
this
in
my
repository,
so
you
can
wanna
take
a
look.
You
are
welcome
to
go
so
right
here,
just
a
win
for
application.
We
have
again
employees
and
same
thing.
You
can
only
see
what
they
are
allowed
to
see.
So
we
are
using
the
same
permission
that
we
already
said
in
our
saf
application
in
non-safar.
A
I
don't
know
you
guys,
but
I
think
that
this
is
amazing,
and
actually
I
don't
know
if
you
guys
have
dealt
with
the
asp.net,
for
example,
right
now
the
microsoft
identity,
new
approach,
I
like
the
the
the
new
things
that
they
are
doing,
but
right
now,
every
time
that
we
have
to
do
the
identity
through
the
microsoft
platform.
It
was
just
not
my
cup
of
tea.
This
one
is,
this:
is,
is
a
beauty
in
my
opinion,
so
with
that
one?
A
I
will
let
ho
che
then
present
a
summary
demo,
and
then
I
will
come
back
with
a
relation
anyway
with
a
web
forms.
So
we
see
that
again
just
follow
these
steps
of
how
the
security
system
and
stuff
work
and
you
can
go
and
check
inside
again.
If
we
go
on
in
the
module,
if
we
can
start
checking
the
the,
if
maybe.
A
B
B
B
What
I
needed
was
in
the
xpo
folder,
so
I
needed
the
the
web
api
web
service
and
basically
the
summary
solution,
so
I
put
that
together
in
a
different
solution
that
had
only
that
in
place.
So
this
is
what
we
have
at
the
moment.
We
have
the
summary
and
forums
application
which
are
these
three
projects.
This
is
like
the
equivalent
to
the
agnostic
module
itself,
which
is
the
application
project.
In
summary,
so
basically
what
we
did
here
is
we
have
a
soft,
normal
self
application.
B
In
this
case,
it's
a
windows
forms
application,
I'm
going
to
run
it
first
time,
so
you
can
see
what
I'm
doing
and
by
the
way
this
example
is
actually
an
example
for
or
synchronization
framework.
So
I
will
show
that
in
like
and
actually
in
the
middle.
So
the
idea
is
like
this:
we
created
our
custom
providers
because
the
customer
once
wanted
wanted
to
to
work
offline
in
summary,
using
the
security
system
from
saf.
So
the
requirement
was
like
a
little
bit
extend.
B
I
would
say
so:
let's
run
this
first
and
let
me
show
you
the
parts
that
I
change
in
here.
I
only
change
one
line.
I
register
or
sync
data
store
provider,
and
I
change
the
connection
string
and
that's
it
so
basically,
this
application
will
create
some
additional
database
to
change
to
save
the
difference
on
the
data.
B
C
B
I
changed
the
password.
I
forgot
this
one.
B
Okay,
so
this
data
was
created
by
the
updater,
so
this
code
is
basically
here,
one
sec,
so
basically
they
inject
the
data
during
the
creation
of
the
database
and
also
they
created
the
first
role
and
the
first
user,
and
so
on
and
so
forth
right
so
now,
what
we
needed
to
do
for
this
customer
is
that
we
need
to
move
all
of
these
to
summary,
basically
so,
but
they
wanted
to
work
offline,
so
that
was
another
another
characteristic.
So
first,
let's
go
and
check
the
databases.
B
Let
me
refresh
this,
and
this
list
is
huge,
because
we
have
a
lot
of
examples,
so
basically
we're
connecting
to
these
databases.
So
this
is
a
normal
database
that
will
be
created
by
saf
or
xpo,
but
then
we
have
our
additional
database.
That
is
the
delta
databases.
Those
are
the
difference
in
how
the
transactions
were
created.
B
So
here
we
have
a
little
bit
of
basically
some
system
tables
for
us
and
basically
we
have
something
that
is
called
the
deltas.
That
is
everything
that
was
created
for
each
transaction
in
general.
You
will
not
see
anything
here,
because
these
are
is
binary
data,
but
in
general
we
are
tracking,
whatever
is
happening
on
the
saf
application
and
we're
saving
it
as
deltas.
B
So
after
that,
what
we
needed
to
do
is
well
move
everything
to
summon
right
or
be
able
to
access
this.
In
summary,
so
for
that
what
we
did
is
we
take
the
web
api
project
that
they
have
and
we
just
modified
it
a
little
bit
so
at
the
beginning,
what
we
did
is
we
registered
our
provider
again
because
they
wanted
to
use
this
functionality
offline.
B
So
after
that,
basically
we
modified
the
startup.
So
everything
else
here
is
like
normal,
I
will
say
like
xpo
code,
and
this
is
how
you
actually
include
xpo
in
a
in
a
web-
api
application,
from.net
core
so
basically
to
add
or
functionality
of
offline
synchronization,
to
be
able
to
use
a
security
system.
In
summary,
what
we
did
is
we
have
a
few
extensions,
so
it's
only
three
lines
to
implement
four
lines
if
you
count
the
the
registration
of
the
provider,
but
beside
that,
it's
like
really
really
simple.
B
B
You
will
be
requesting
everything
to
the
server
right
so
to
do
the
scenario
that
the
customer
wanted.
We
included
the
scene
controller.
So
basically
you
don't
have
to
do
anything
here.
I
just
did
the
overwrites
to
show
that
you
can
override
some
part
of
the
controller,
but
in
general
you
just
need
to
add
a
controller
and
inherit
it
from
sync
controller
base.
B
So
now
that
we
have
that
we
can
use
the
security
system
and
basically,
all
data
model
in
in
the
summary
application
this
I
will
show
it
like
really
quick,
because
I
don't
want
to
repeat
whatever
javier
said,
because
the
implementation
of
the
security
system
is
basically
agnostic.
B
The
same
lines
that
you
will
do
for
console
is
the
same
thing
that
you
will
do
for
summary
and
that
you
will
do
for
any
other
platform.
So
in
general,
here
all
the
data
access
is
encapsulated
in
this
file,
the
xpo
helper
file
and
if
you
have
been
working
with
xpo
for
long
time
last
as
I
do,
I
remember
that
the
first
appearance
of
these
of
these
class
was
in
how
to
use
xpo
in
dot
net
is
and
sorry
in
web
forms.
B
B
Then
you
need
the
you
need
to
initialize
the
security
basically
by
telling
it
which
type
of
user
you
will
use,
which
type
of
authentication
you
will
use
and
which
type
of
role
you
will
use,
and
after
that
you
just
need
to
create
an
object
space
provider,
a
secure,
object,
space
provider.
The
trick
is:
is
that
that
if
you
want
to
be
able
to
filter
your
data
according
to
the
security
system,
for
example,
if
you
don't
have
permission
in
one
type,
you
want
to
exclude
it.
B
B
B
B
Sorry
for
that
guys,
just
let
me
run
this
as
an
administrator,
because
otherwise
I
cannot
download
the
file.
So
one.
B
B
B
B
No
I'm
going
to
put
it
there.
It's
in
the
login
view
model.
So
it's
here
so
here
in
the
example
they
are
connecting
to
the
original.
B
Provider,
which
is
the
one
that
is
in
this
controller,
the
xpo
controller,
but
in
this
case
we're
going
to
do
it
in
a
different
way,
we're
going
to
do
it
through
the
sync
framework.
So
what
we're
going
to
do
is
come
here
and
replace
it.
I
have
added
a
different
indeed
method
for
for
this,
so
let
me
put
this
here
and
let's
run
this,
so
let's
do
multiple
startup
and
we
want
to
start
the
api.
B
B
So,
okay,
it's
almost
done.
We
have
the
api
running
and
then
we
have
the
emulator.
So
let's
wait
a
little
bit
for
this
to
to
finish
loading
and,
let's
start
using
xpo
and
the
data
created
by
the
saf
application
in
the
same
application,
but
it
will
be
offline
actually.
B
Okay,
so
this
is
running
at
the
moment,
so
let
me
show
you
currently.
I
have
an
internet
connection
in
the
emulator,
so
what
I
will
do
is,
I
will
sync
right
now:
it's
taking
all
the
deltas
and
information
that
we
got
from
the
saf
application,
so
now
synchronization
is
done.
So
basically,
what
I
will
do
is
I
can
put
this
in
flight
mode
and
yeah
right
now.
There
you
go
and
then
basically
we
can
use
at
the
moment
xvo
like
the
security
system
from
stuff.
B
B
B
So
we
will
see
that
every
change
that
I
do,
I
can
just
get
it
from
from
this-
the
mobile
application
to
the
saf
application,
and
all
of
that
is
going
through
the
security
system.
Basically,
so
let's
wait
a
little
bit
for
this
to
load
now
it
needs
to
load
three
different
applications.
B
B
B
B
I
think
one
of
these,
but
let's
see
how
the
listview
changed.
So,
let's
refresh
this
so
see,
aaron
is
seo
now
and
abigail.
The
name
changed
to
saf,
so
everything
is
working
basically
offline
and
we
have
the
ability
to
use
the
security
system
in
a
samaritan
application.
So
basically
I'm
going
to
do
another
changes
here,
I'm
going
to
set
this
offline
again
and
this
alfred
we're
going
to
change
it
to
alfred,
dennis
and
save
it.
B
B
A
Okay,
perfect,
hey,
so
I
stopped
checking
so
I'll
turn
my
screen
and
okay.
So
we
keep
going
one
question
that
is
in
the
chat
about
asking
how
they
can
using
the
security
system
of
staff,
keep
the
session
open,
so
they
don't
have
to
log
in
every
time.
So
if
you
check
there
is
actually
a
request
from
one
of
the
suffer
he's
asking
for
that,
specifically
a
request
and
that's
not
something
that
the
soft
security
system
should
take
care
of.
That's
something
that
your
application
should
be
able
to
do
so
pretty
much.
A
You
can
use
something
like
the
secure
storage
and
then
you
can
do
some
type
of
implementation
in
your
site.
So
they
knows
that
it's
already
logged
in,
for
example,
in
the
blazer
in
south
laser,
the
authentication
is
saving
a
cookie.
So
only
the
first
time
that
you
log
that
you
log
in
you
will
need
to
put
the
credential
after
that,
you
will
be
able
to
keep
using
your
application
without
bugging
the
user
every
time
with
a
new
credentials,
a
pro
prompt,
so
yeah.
A
Please
take
a
look
at
the
example
and
if
any
question,
or
something
just
reach
out
to
us
or
to
the
support
center
so
with
that
one,
let's
then
quickly
review
and
again
it
will
be
a
little
bit
more
of
the
same,
but
I
just
want
to
show
that
you
can
use
it
everywhere
so
right
here.
This
is
our
web
form
application.
We
have
the
default
and
if
you
see
here
the
the
things
start
to
to
to
be
the
same
security
strategy
complex
and
then
they
they
object
space
they
log
on.
A
Then
you
pass
and
so
on,
so
on
so
on.
So
let's
just
run
it
and
see
that
it
will
have
the
same
behavior
and
in
the
case
that
jose
was
showing
about
the
summary.
The
only
important
part
is
that
you
need
to
have
a
web
api,
a
middle
tire
that
where
all
of
these
settings
is
happening,
you
cannot
do
it
right
there
in
the
client,
like
if
you're,
using
some
type
of
a
javascript
that
you're
doing
like
blazer
web
assembly.
A
Those
will
need
that
that
a
red
service
in
the
middle,
but
right
here
again
saying
saying
a
concept
we
have
authentication
standard.
We
have
our
security
strike
the
complex
we
have
for
a
type
of
a
permission:
policy,
user
permission,
policy
role
and
the
saying
is
actually
behavior.
Only
the
department
that
they
are
belong
to
it
will
choke
nothing
else.
So
that's
web
form.
What
else
can
we
see
about
the
security
system?
We
can
definitely
go
and
check
blazer
and
in
blazer
is
a
little
more
comprehensive
example.
A
Then
you
will
have
the
data
store
provider
and,
let's
see,
let's
go
back
to
and
let's
close
the
web
form
version,
because
this
one
was
really
simple
and
let's
see
the
the
blazer
one,
then
here
you
have
again
the
security
provider.
Where
is
doing
the
authentication,
the
type,
the
police
user,
this
security
strategy.
So
as
much
as
you
can
understand
how
saf
is
using
that
api
to
authenticate
and
to
protect
your
data,
you
will
be
able
to
use
it
anywhere,
most
probably
in
the
future.
A
A
Okay,
let's
see,
I
think
that
I
have
to
close
visual
studio,
open
array.
So,
while
that
I
will
come
back
to
the
blazer
example,
but
let's
see
a
few
other
things
that
we
can
do
with
the
security
system,
so
we
were
talking
about
all
the
steps
with
blazer.
This
is
really
here
all
the
things
that
we
need,
but
we
also
have
already
the
the
official
support
for
how
to
change
database
and
runtime,
and
this
is
already
released
by
devexpress.
We
did
a
a
workaround.
A
Meanwhile,
we
get
this
one,
but
this
is
the
the
right
approach,
things
that
also
we
can
use
how
to
register
a
new
user
restore
a
password.
All
of
those
things
are
already
there
for
us,
and
one
example
is
this
restore
password
that
if
we
click
there,
it
was
like
this
is
an
old
example
that
is
being
adapted.
A
A
So
right
here
you
can
put
your
email
here
and
it
will
send
you
an
email
with
a
new
password
and
then,
when
you
click
on
it,
it
will
have
the
change
log
on
next
sign
on.
So
that
way,
you
can
just
add
the
the
new
password
that
you
need
and
this
one
that
is
not
working,
because
this
is
a
an
example
that
I
need
to
update.
It's
also
a
great
example
of
the
capabilities
that
we
have
with
the
staff
security
system.
Let's
wait
for
it.
A
There
is
no
limitation
in
any
point,
you
can
do
azure
active
directory.
You
can
do
a
facebook,
google
instagram
shopify.
What
name?
A
If
you
see
here
and
forget
about
this
is
a
little
out
of
order,
because
I
have
to
update
this
example,
but
we
have
google,
microsoft,
facebook,
twitter,
instagram,
anything,
let's
you
click
there
and
it
takes
you
to
the
to
the
login
screens
there
and
it
creates
the
user
for
you
in
the
in
the
system
and
if
you
are
using
active
directory,
you
can
even
check
the
name
of
your
role
and
map
it
to
the
role
that
you
have
in
staff.
A
So
the
the
the
limitations
are,
none
find
a
standard
that
works
with
the
security
systems
and
go
for
it.
You
are
be
able
to
use
it
in
any
platform
in
any
device
and
you'll
be
good
to
go,
and
let's
now
reopen
the
place,
for
example,
because
that
one
I
like,
I
am
kind
of
now
in
love
with
blazer,
I
would
have
to
say.
A
A
A
C
A
A
Places
that
is
it's
a
beauty
in
my
opinion
again,
that
is
hard
for
me
to
to
use
in
new
application
and
don't
go
for
the
security
system
of
staff,
because
I
already
do
know
that
one
completely.
So
if
you
have
trying
to
use
any
other
type
of
authentication,
you
will
see
how
cumbersome
it
becomes.
At
least
there
is
a
big
learning
curve
in
there.
One
thing
that
I'm
dying
to
try
is
a
using
the
actual
adb2c,
because
I'm
using
that
right
now
for
a
summary
application
and
in
a
nice
addition
to
the
usa.
A
So
in
that
regard
we
also
have,
and
then
I
pass
it
to
host
again
and
then
config.
This
official
example
that
if
you
see
it's
already
in
south
placer
and
it's
authenticating
with
all
these
providers,
that
they
are
really
useful
for
a
lot
of
people
so
again
really
nice
example
really
nice
options
that
we
have
here:
github
azure,
a
google,
facebook,
twitter,
instagram
shopify.
A
What?
What
is
that
we
can?
We
can
put
it
there
so
and
in
that
regard
also
we
saw
it
in
one
of
the
I
would
say,
of
the
frameworks
or
one
of
the
tools
that
is
not
common,
like
at
least
in
it
too.
Much
like
this
uno
uno
is
a
way
to
using
the
summer
from
wp
to
target
mobile
applications
and
even
web
assembly
nowadays.
So
even
there
everywhere
there
were
donated
runs.
Some
security
will
run
so.
B
Okay,
well,
let's
see
in
here
we
have
a
little
bit
of
the
demo
effect
today,
so
this
will
be
like
kind
of
simple
okay.
So,
as
xavier
was
saying
in
this
case,
we
have
an
implementation,
we're
using
this
framework,
which
is
the
uno
platform,
which
basically
is
the
way
to
share
the
same
saml
ui
from
wpf
and
use
it
across
all
the
platforms
possible.
They
have
a
lot
of,
I
mean
they
have
more
coverage
than
some
are
informed
somehow,
but
the
tooling
is
always
is
a
little
bit
behind.
B
So,
basically,
here
there
is
a
demo
of
how
the
ui
is
constructed
and
how
it
will
work,
and
the
most
interesting
part
about
this
type
of
ui
is
that
you
created
once
and
basically
you
run
it
everywhere
so
well
here
they
have
a
example
of
the
controls,
but
let
me
show
you
the
solution.
B
I
was
working
on
this
solution.
Yesterday
it
was
working
fine.
This
morning
it
was
working
fine,
but
just
one
moment
before
the
the
meetup
it
exploded
in
the
morning.
So,
okay,
basically
this
the
layout
is
the
same
layout
that
we
did
with
the
summary
approach.
It's
exactly
the
same,
but
in
this
case
I
only
took
from
the
repository
from
the
express
the
web
api
service
and
the
soft
solution.
B
So
I
will
not
show
that
again
because
basically
the
same
principle
and
then
when
you
create
a
new
one
application,
it
will
lay
out
all
these
platforms
for
you.
So
if
you
really
want
to
run
the
security
system
any
anywhere
and
everywhere
see
how
many
platforms
are
supported
by
uno,
android,
ios,
mac
jtk
tyson-
which
I
think
is
I
never
used
tyson
before-
but
I
think
it's
os
for
for
tvs,
wpf
or
uwp,
and
what
everyone
wants
webassembly.
B
So
I
have
unloaded
these
projects.
For
one
reason,
the
methodology
that
you
know
uses
is
share
project.
So,
if
I
need
to
compile
something,
I
need
to
compile
everything
and
that
will
take
forever
for
this
case.
So
since
my
ui
exploded
earlier,
basically,
what
I
did
is
I
remove
it
and
just
replace
it
with
one
button
here.
So
it
would
be
like
a
little
lame
example
at
the
moment,
but
I'm
going
to
put
this
public,
so
everyone
can
take
a
look
to
it
here
in
the
ui.
B
We
will
change
it
for
basically
agreed
with
the
data.
So
let
me
run
this.
I
did
the
same
as
before.
I
started
an
interrupt
tunnel,
so
I'm
able
to
access
the
application
from
the
outside,
so
I
can
access
through
from
the
emulators.
So
I
know
for
sure
that
we
are
running
in
all
the
platforms.
The
only
one
that
I
I
have
been
having
troubles
with
is
web
assembly,
but
that
is
the
one
that
I
really
want
to
make
it
work
for.
So
I
will
continue
developing
this.
B
B
So,
as
I
told
you,
if
you
go
and
check
that
example,
this
one
in
github,
there
are
a
lot
of
interesting
stuff
that
are
done
there,
so
you
can
just
take
them
for
your
project,
for
example,
that
that
file
that
I'm
showing
you
the
xpo
helper,
is
basically
here
in
the
core,
so
I
actually
have
in
the
sync
framework
example,
I
have
some
notes
from
where
I
got
each
project
and
what
did
I
modify
on
each
project
to
make
it
work?
So
let
me
run
this.
B
B
B
In
this
case,
the
main
difference
is
that
we
are
not
using
offline
synchronization.
We
are
accessing
the
security
system
directly
online
through
the
web
api.
B
So
one
sec,
let
me
see
if
the
api
is
running.
It
should
be
here
yeah,
okay,
so
we
only
change
the
the
label
for
hello
security
system
and
we
have
this
button
here.
So
I
will
put
a
handler
there
like
at
the
boot
point,
so
just
wait
for
a
second
he's
here
and
actually
I
will
give
you
an
advice
guys
before
you
start
doing
demos
for
for
a
conference
like
this
start
using
the
the
source
controller.
B
So
you
don't
lose
your
changes
as
I
did
today.
Okay,
so
we
have
the
tunnel,
we
have
the
api
that
is
working
and
we
have
the
application
on
the
emulator
right
now.
Here
you
should
imagine
agreed
because
I
don't
have
it.
I
have
to
remove
it
this
morning,
so
let's
log
in
and
I
will
write
the
output
to
the
console,
so
this
basically
will
use
the
security
system
directly
online
from
the
web
api.
B
B
B
See
now
we
got
all
the
information
and
basically
it's
working.
The
only
advice
that
I
will
give
you
when
you're,
using
like
different
platforms
that
are
not
windows,
forms
or
web
forms,
it's
something
that
it
took
a
while
for
me
to
figure
it
out
actually
spend
a
few
hours.
Looking
for
this
is
that
you
need
to
make
sure,
if
you're
not
using
the
full
framework
that
you
go
to
the
startup
of
your
application,
and
you
write
these
lines
because
usually
the
security
system
and
stuff
in
general
will
use
tracer
to
do
the
sap
log.
B
You
know
that
so
it
looks
for
the
ap
app
config
file
and,
in
summary,
that
doesn't
exist
that
doesn't
exist
on
webassembly
either.
So
my
demo
was
exploding
all
the
time
because
he
was
looking
for
the
app
config
file
and
in
this
case
you
just
need
to
turn
it
off.
You
should
do
use
configuration
manager
false.
B
So,
if
you're
going
to
start
with
summary
and
with
any
other
framework,
that
is
not
the
full.net
remember
to
write
these
lines,
because
otherwise
your
application
will
not
start.
So
that's
all
for
me,
javier
in
this
case,
I
would
make
this
example
beer
and
publish
it
in
youtube.
I
guess
so.
A
Okay,
that's
fine,
so
pretty
much
again
is
a
more
of
the.
How
much
can
we
do
with
the
security
system?
We
can
do
anything
that
we
actually
decide
and,
as
we
were
talking
before,
we
can
create
the
logic
to
loading
with
identity
providers.
We
load
with
azure
active
directory.
We
can
change
databases
at
runtime.
We
can
create
new
accounts,
allow
the
user
to
create
their
own
accounts
like
here.
We
can
allow
them
to
restore
the
password,
so
is
really
powerful,
really
comprehensive
and
really
a
battle
tested.
A
This
has
been
with
zaps
in
the
beginning,
and
I
have
again
I'm
my
bias,
but
there
is
no
application
that
I
need
to
use
some
type
of
flowing
that
I
know
my
my
first
stopping
point
is
some
security
system.
So
with
that
one
and
open
the
I
open
the
the
meet
up
for
question
for
discussion,
anyone
who
wants
to
share
their
experience
of
if
they
have
been
using
the
soft
security
system
in
non-stop
app
if
they
have
wrong
into
any.
A
C
That's
actually
a
good
point.
Jose
is
the
performance
when
it
comes
to
checking
permissions.
When
you
have
complicated
or
very
complex
criteria,
the
there
are
options
to
cache
the
permission,
rules
versus
constantly
reloading
them,
which
does
seem
to
have
a
an
effect
on
that.
A
Wait,
I
think
that
is
the
first
time
that
we
are
done
in
less
than
two
hours.
B
A
A
B
A
A
So
dave
fernando
is
asking
if
you
later
can
share
the
the
code,
the
sample
project
that
you
presented
and
as
well
all
the
demos
that
we
presented
most
most
of
them
are
already
in
the
landing
page
from
the
sub
security
system.
But
all
of
those
when
we
are
more
than
happy
to
put
it
in
your
public
repo.
So
you
guys
can
access
to
it,
download
it
play
with
it,
and
we
will
welcome
any
questions
or
any
suggestions
or
any
discussion.
Devices
feel
free
to
reach
out
to
us.
A
I
mean
that
would
be
nice
and
again
at
the
end,
just
to
to
say
something
else.
It
doesn't
have
to
be
about
the
security
system.
If
you
have
any
suggestions
about
the
roadmap
roadmap
is
one
of
the
big
things
that
we
talk
about
today.
Everything
that
is
coming
everything
that
you
guys
are
needing.
If
you
have
any
type
of
a
suggestion.
A
A
B
A
And
we'll
see
you
in
the
next
second
thursday
of
next
month.
If
you
have
any
topics
you
want
us
to
cover
next
month,
we
can
maybe
talk
about
using
soft
models
in
non-stop
app
about
the
audit
trail
about
validation,
about
or
any
other
topic
that
you
guys
feel
that
we
should
cover
more.
I'm
definitely
sure
that
later
in
the
future,
we
need
to
do
a
second
soft
blazer
update
with
everything
new
that
is
coming
on.
But
as
always
thank
you
for
being
here
and
see
you
in
the
next
one
saf
out.
Thank
you
guys.