Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
IBM Worklight Mobile Application Development Essentials

You're reading from  IBM Worklight Mobile Application Development Essentials

Product type Book
Published in Feb 2014
Publisher
ISBN-13 9781782177609
Pages 144 pages
Edition 1st Edition
Languages

Worklight security principles, concepts, and terminologies


IBM Worklight provides various security roles to protect applications, adapter procedures, and static resources from an unauthorized access.

Each role can be defined by a security test that comprises one or more authentication realms. The authentication realm defines a process that will be used to authenticate the users.

The authentication realm has the following parts:

  • Challenge handler: This is a component on the device side

  • Authenticator and login module: This is a component on the server

    One authentication realm can be used to protect multiple resources. We will look into each component in detail.

  • Device Request Flow: The following screenshot shows a device that makes a request to access a protected resource, for example, an adapter function, on the server. In response to the request, the server sends back an authentication challenge to the device to submit its authenticity:

    Request/Response flow between Worklight application and...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}