Book Image

Easy Web Development with WaveMaker

By : Edward Callahan
Book Image

Easy Web Development with WaveMaker

By: Edward Callahan

Overview of this book

Developers of all levels can now easily develop custom, responsive, and rich web application clients with secure, scalable servers utilizing relational databases and RESTful services using WaveMaker Studio. Whether you need a departmental business application or a form application for your weekend club, this book will show you how to design, develop, and deploy professional grade web applications with WaveMaker. Easy Web Development with WaveMaker will help you use WaveMaker to design, develop, and deploy rich, responsive web applications, even if you are not a programmer. If you need to build a data-driven web application, but you only know ‘enough to be dangerous,' you need this book. This book examines every angle of using WaveMaker to build applications, from dissecting examples to customizing, deploying, and debugging your own applications. This book enables the non-professional programmer to become comfortable not only with using WaveMaker Studio itself, but also with the artefacts produced by the studio as well as the runtime and services provided by the WaveMaker framework. You will learn everything, from how customize the user experience with JavaScript and CSS to integrating with custom Java services and the Spring Framework server-side. Easy Web Development with WaveMaker 6.5 is packed with examples, code samples, screenshots, and links to equip you to be successful with WaveMaker Studio.
Table of Contents (23 chapters)
Easy Web Development with WaveMaker
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface
6
Styling the Application
7
Working with Databases
8
Utilizing Web Services
Index

Chapter 12. Securing Applications

We have been discussing how to develop rich web applications using WaveMaker Studio. Before we deploy any application out into the wild, we must ensure that our application is secure. The application must not allow users, malicious or otherwise, to gain inappropriate access to data. In this chapter, we will learn how to secure WaveMaker applications.

WaveMaker security tooling provides for both authentication and authorization strategies. Authentication is the process of verifying the authenticity of the user's identity. Authorization is the function of determining what services, components, and capabilities the user is authorized to access. In WaveMaker, authentication is achieved by logging in to the application using a username and password combination. The username and password are compared to the stored values in an authentication source, such as a database or Lightweight Directory Access Protocol (LDAP). Once the user is authenticated, the groups that...