1 00:00:00,300 --> 00:00:04,930 We have been discussing a lot about ought to framework in the last few videos. 2 00:00:05,130 --> 00:00:06,630 Again, what we discuss. 3 00:00:06,660 --> 00:00:12,800 Those are like very in detail about what framework, what the different components involve and what 4 00:00:12,810 --> 00:00:15,940 are different grand types that ought to follow. 5 00:00:16,260 --> 00:00:22,060 But again, if you want me to speak about war, too, I can speak even more than 10 hours also. 6 00:00:22,320 --> 00:00:25,740 So that's how we can go in deep into our two framework. 7 00:00:26,040 --> 00:00:33,000 But I think we spend enough time to understand what is what to framework and different terminologies 8 00:00:33,000 --> 00:00:33,580 around it. 9 00:00:33,960 --> 00:00:39,630 So let's try to quickly discuss the summary of what we discussed in this section at the starting of 10 00:00:39,630 --> 00:00:46,080 the section we discussed like what are the problems that what the framework is trying to solve in the 11 00:00:46,080 --> 00:00:52,170 alteration and identification clause, followed by a quick introduction to or to what are different 12 00:00:52,170 --> 00:00:54,990 components present inside what to flow like. 13 00:00:54,990 --> 00:00:58,690 Attraction's our client, our user resource or not. 14 00:00:58,830 --> 00:01:05,459 And also, we also discuss what different what to grant and flows that the framework follows in order 15 00:01:05,459 --> 00:01:10,380 to generate the access to guns inside the authentication and alteration flow. 16 00:01:10,740 --> 00:01:17,520 Finally, we looked at what are different ways that Rezo server violate the tokens issued by the operations 17 00:01:17,520 --> 00:01:19,590 that were inside the order to flow. 18 00:01:19,770 --> 00:01:25,270 With this, we closed a long section on the order to frame the discussion. 19 00:01:25,500 --> 00:01:26,010 Thank you. 20 00:01:26,010 --> 00:01:28,020 And see you in that next section by.