... | ... | @@ -22,10 +22,6 @@ Além disso, outras práticas incluem: |
|
|
## Segurança :lock:
|
|
|
Para controle de acesso e autenticação foi decidido utilizar o OAuth 2
|
|
|
|
|
|
### Links Úteis
|
|
|
* https://auth0.com/pt/intro-to-iam/what-is-oauth-2
|
|
|
* https://docs.spring.io/spring-security/reference/servlet/oauth2/index.html
|
|
|
|
|
|
## Cloud :cloud:
|
|
|
Os recursos da AWS utilizados foram:
|
|
|
* S3 storage
|
... | ... | @@ -33,4 +29,6 @@ Os recursos da AWS utilizados foram: |
|
|
|
|
|
#### Links Úteis
|
|
|
* https://www.geeksforgeeks.org/spring-boot-architecture/
|
|
|
* https://medium.com/@RogelioOrts/layered-architecture-spring-boot-af7dc071d2b5 |
|
|
\ No newline at end of file |
|
|
* https://medium.com/@RogelioOrts/layered-architecture-spring-boot-af7dc071d2b5
|
|
|
* https://auth0.com/pt/intro-to-iam/what-is-oauth-2
|
|
|
* https://docs.spring.io/spring-security/reference/servlet/oauth2/index.html |
|
|
\ No newline at end of file |