IBM Worklight security overview
This chapter provides an architectural overview of the security capabilities of IBM Worklight. It also introduces the general security principles, concepts, and terminology with which Worklight is compliant.
This is your starting point for understanding these security capabilities. Subsequent chapters in this book delve deeper into each Worklight security feature, and provide details about how it can be used to secure your mobile application (app), its data, and access to your enterprise resources.
3.1 Security principles ...
Get Securing Your Mobile Business with IBM Worklight now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.