1 00:00:00,180 --> 00:00:07,050 Here is a summary of what we discuss in inside this intersection and the starting of the section we 2 00:00:07,050 --> 00:00:14,460 discussed about what is multilevel security, how it is different compared to authorizing the user at 3 00:00:14,460 --> 00:00:18,660 the party level and what challenges we have that with that approach. 4 00:00:18,780 --> 00:00:25,830 Eventually, we understand middle level security can provide you more flexibility, particularly for 5 00:00:25,830 --> 00:00:27,300 non Web applications. 6 00:00:27,450 --> 00:00:33,810 And if we have a requirement where you want to apply traditional rules at different layers of your application, 7 00:00:33,810 --> 00:00:41,450 like repository service and controllers, we also looked at there are two ways our approaches to implement 8 00:00:41,470 --> 00:00:42,550 metal level security. 9 00:00:42,570 --> 00:00:50,100 One is invocation authorization, where we can control the execution of an materne or invocation of 10 00:00:50,100 --> 00:00:55,500 a matter before and after by using pre authorized and post outrage. 11 00:00:55,650 --> 00:01:01,380 And at the same time, we also looked at filtering authorization where we can control the execution 12 00:01:01,380 --> 00:01:07,770 of a method based upon the parameters that is being received by the method and the parameters that is 13 00:01:07,770 --> 00:01:11,650 being returned by the method using Prefill post filter. 14 00:01:12,210 --> 00:01:18,510 Most importantly, please do remember, like if we are using post authorized and post filter, your 15 00:01:18,510 --> 00:01:25,260 business logic defined inside your method will still be executed and the database, any interactions 16 00:01:25,260 --> 00:01:31,530 that you have done will not be rolled back, even in the scenarios of four zero three exception being 17 00:01:31,530 --> 00:01:33,720 thrown from the security framework. 18 00:01:33,990 --> 00:01:41,400 With this, I'm hoping you're able to understand how to implement Matalote security inside any application. 19 00:01:41,760 --> 00:01:47,310 I also upload the code that we have written inside the section to this video. 20 00:01:47,670 --> 00:01:53,400 Please do some hands on inside the Web application that you are also building along with me. 21 00:01:53,520 --> 00:01:58,590 And if you have any questions, you can look at the code that I'm being uploading. 22 00:01:58,890 --> 00:02:04,020 And if you still have any questions, you can always reach out to me by posting your questions in the 23 00:02:04,260 --> 00:02:05,230 Q&A section. 24 00:02:05,430 --> 00:02:05,970 Thank you. 25 00:02:05,970 --> 00:02:07,590 And see you in the next section by.