I have a really interesting and difficult task. What I need is to realise next authentication chain.
Imagin, that you have a secured application, lets it\'s going to be j