🔥 Secure your spot now and embark on your journey to becoming a Spring Boot master! Use promo code "EARLY_BIRD_30" during registration to enjoy this incredible 30% discount. Don't miss out on this opportunity! 🔥 aliboucoding.com/p/spring-boot-in-depth?coupon_code=EARLY_BIRD_30&product_id=4985811
Thank you Mr. Bouali Ali for your excellent teaching. For me it is still complicated where to use Role and Permissions in these diagrams. It'll be be wonderful just showing simple examples with or without codes how Roles and Permissions work in various situations.
And one more thing that I can't find right order of your videos. It's some way complicated. It will be great if you sort it with initial numbers. (01..., 02...) Thanks for your great work once more time
Great content 😍 and ali reminding you again great if you can show how to verify account through emails after registeration in your great spring security series🤩
Hello bro! Many thanks for the videos that you release! In the following videos, can you show how to make a backend with a role based authorization and registration microservice? And how to make endpoints that are available for authorized users who has some roles?
Thank you for such a simple and yet completing explanation of the process. But my question is at what part of the last diagram does all the filter, authentication happens? is it the jwt validation step?
@@BoualiAli Thank you for noticing, I am sorry for not being clear. You had two flow charts. In the first one, we had everything working with filter, authentication manager, authentication provider and so on. I am just confused about where does that chart fits into the last chart where we validate the token , then send the request to the dispatcher servlet. At which point does the first chart operations happen.
In your spring security playlist is it okay to use a UserDTO instead of directly using User model for authentication task or can i keep the authentication use the User model and use a UserDTO to tasks such as updating deleating user details?
is there a way to avoid sending db requests for jwt filter? I want to verify login details only when loging in, after that i just validate the token with no database check! Is this safe and will jwt per request is havy on the database? Because we retrieve user information each time a request to a protected resource is performed
can you make a video when a user register to get an email for verification and also make two different login one for normal user and one for admin. Also make an video for forgot password
THANK YOU SO MUCH. I have been struggling so hard wrapping my head around Spring Security. Love you took a no code explanation approach.
Glad you think so!
Thank you, Mr. Ali, for being a tremendous support in my journey as a software engineering student. I truly appreciate your help and effort.
You are very welcome
amazing video, Ali. Explained so clear and well, with code, diagram and beautiful analogy.
Glad you liked it!
Thank you, this is golden!
🔥 Secure your spot now and embark on your journey to becoming a Spring Boot master! Use promo code "EARLY_BIRD_30" during registration to enjoy this incredible 30% discount. Don't miss out on this opportunity! 🔥
aliboucoding.com/p/spring-boot-in-depth?coupon_code=EARLY_BIRD_30&product_id=4985811
Thank you Mr. Bouali Ali for your excellent teaching. For me it is still complicated where to use Role and Permissions in these diagrams. It'll be be wonderful just showing simple examples with or without codes how Roles and Permissions work in various situations.
For roles and permissions, check the video.
I explained in details that topic
A very precise and to the point explanation. One can easily revise security before appearing in an interview. :)
Happy to help
And one more thing that I can't find right order of your videos. It's some way complicated. It will be great if you sort it with initial numbers. (01..., 02...) Thanks for your great work once more time
The videos are uploaded in the right order.
Also, check the playlist, the are arranged there.
I'm always pointing to the playlist.
Enjoy learning
love your tutorials Ali!
Great explanation!!!!. Thanks for your time and work.
Happy you liked it
Great content 😍 and ali reminding you again great if you can show how to verify account through emails after registeration in your great spring security series🤩
Sure I will
Check my website. I have a course there showing that
Thanks a lot sir, please make video on video streaming app.
Thank you so much, very well explained!
Very clear, TYSM !
With lots of respects dear Ali, could you make a practical video about session management in spring boot.
Wow thank you sir ❤got idea how spring security works
Happy to help
Thank you so much, very good explanation made everything clear 👏🏻❤
Good job brother Ali
Thank you brother
Gold Content ⭐
Enjoy it
espectacular, siempre pendiente de tus videos.
Happy to have you here
Amazing explanation. I don't know if it aged well considering the scandals around the white parties haha, but that made perfect sense, thanks !
Thank you so much !
You're welcome!
wonderfull content
Glad you think so!
Thank you sir, This is awesome 💗
Most welcome 😊
Mr Ali U're the great✌
Thank youu!
This is awesome !!!! explanation. Can you add how API gateway in microservices architecture use this auth service ?
Yes, definitely
Hello bro! Many thanks for the videos that you release! In the following videos, can you show how to make a backend with a role based authorization and registration microservice? And how to make endpoints that are available for authorized users who has some roles?
Thanks for the idea!
thank you thank you always thank you
My pleasure
Thank you for such a simple and yet completing explanation of the process. But my question is at what part of the last diagram does all the filter, authentication happens? is it the jwt validation step?
Which part?
@@BoualiAli Thank you for noticing, I am sorry for not being clear. You had two flow charts. In the first one, we had everything working with filter, authentication manager, authentication provider and so on. I am just confused about where does that chart fits into the last chart where we validate the token , then send the request to the dispatcher servlet. At which point does the first chart operations happen.
Crystal clear, thank you ali sir , could you please share the diagram ?
Glad you think so!
Thank you sir!
You are welcome!
Thanks a lot
So each request hits DB to find user by email? that part seems wrong. 13:13
Not wrong, but can be optimized.
I will publish a video soon
In your spring security playlist is it okay to use a UserDTO instead of directly using User model for authentication task or can i keep the authentication use the User model and use a UserDTO to tasks such as updating deleating user details?
thank you for your helpfull content, can we get a Exception handling in Spring Security course too?
already done
Good explaination
Awsome . ❤ best
Thank you
Hello there! Thanks for this content .English is not my mother lenguage , so subtitles are very helpfull
contributions in this topic would much welcome
No Complex puzzle with Sir Ali Bouali 😊😊
I really appreciate that
is there a way to avoid sending db requests for jwt filter? I want to verify login details only when loging in, after that i just validate the token with no database check! Is this safe and will jwt per request is havy on the database? Because we retrieve user information each time a request to a protected resource is performed
Yes there is.
I'M creating a new course for that.
Stay tuned
Can we implement our own AuthenticationManager?
why?
Great, could you also explain spring boot? :)
Can you precise?
why are the subtitles so bad, there are so many typos and so many words wrongly subbed. can be confusing for people
I'm trying to do my best and for free
Tutorial about kafka please 🎉
Coming next week
Apprecieate for your explanation. Can you share us your diagram link? 🤟🤟
app.eraser.io/workspace/yZx9DidVAFFP3ISQ4Kx8?origin=share
can you make a video when a user register to get an email for verification and also make two different login one for normal user and one for admin. Also make an video for forgot password
Check my website for that
Tu nous as oublié nous les francophone mon ami.
Sorry for that my friend.
I'm only publishing content in english now
looks like there's no link available
Which link?
I updated the description already.
Thank you guys for letting me know.
You are awesome
can you share me your diagram? please.
Please,you can create a voice chat(real-time) on the spring?Please,you can create a voice chat(real-time) on the spring?
Check the videos on my channel.
I created one already
Haha 😂 no code promise ended up showing the stuff on the code again. Coding became so much of a technicians job 🤪
😁