4. Security configuration
Different components have been used to build the platform. Refer to their specific repositories to contribute to the them.