O'Reilly logo

Easy Web Development with WaveMaker by Edward Callahan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Securing Applications

We have been discussing how to develop rich web applications using WaveMaker Studio. Before we deploy any application out into the wild, we must ensure that our application is secure. The application must not allow users, malicious or otherwise, to gain inappropriate access to data. In this chapter, we will learn how to secure WaveMaker applications.

WaveMaker security tooling provides for both authentication and authorization strategies. Authentication is the process of verifying the authenticity of the user's identity. Authorization is the function of determining what services, components, and capabilities the user is authorized to access. In WaveMaker, authentication is achieved by logging in to the application ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required