... | @@ -19,6 +19,18 @@ Além disso, outras práticas incluem: |
... | @@ -19,6 +19,18 @@ Além disso, outras práticas incluem: |
|
|
|
|
|
![image](uploads/c91ea75f1e804f2c1edd38544e675dd1/image.png)
|
|
![image](uploads/c91ea75f1e804f2c1edd38544e675dd1/image.png)
|
|
|
|
|
|
|
|
## Segurança :lock:
|
|
|
|
Para controle de acesso e autenticação foi decidido utilizar o OAuth 2
|
|
|
|
|
|
|
|
### Links Úteis
|
|
|
|
* https://auth0.com/pt/intro-to-iam/what-is-oauth-2
|
|
|
|
* https://docs.spring.io/spring-security/reference/servlet/oauth2/index.html
|
|
|
|
|
|
|
|
## Cloud :cloud:
|
|
|
|
Os recursos da AWS utilizados foram:
|
|
|
|
* S3 storage
|
|
|
|
* EKS
|
|
|
|
|
|
#### Links Úteis
|
|
#### Links Úteis
|
|
* https://www.geeksforgeeks.org/spring-boot-architecture/
|
|
* https://www.geeksforgeeks.org/spring-boot-architecture/
|
|
* https://medium.com/@RogelioOrts/layered-architecture-spring-boot-af7dc071d2b5 |
|
* https://medium.com/@RogelioOrts/layered-architecture-spring-boot-af7dc071d2b5 |
|
|
|
\ No newline at end of file |