-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Easy Web Development with WaveMaker
By :
We have been discussing how to develop rich web applications using WaveMaker Studio. Before we deploy any application out into the wild, we must ensure that our application is secure. The application must not allow users, malicious or otherwise, to gain inappropriate access to data. In this chapter, we will learn how to secure WaveMaker applications.
WaveMaker security tooling provides for both authentication and authorization strategies. Authentication is the process of verifying the authenticity of the user's identity. Authorization is the function of determining what services, components, and capabilities the user is authorized to access. In WaveMaker, authentication is achieved by logging in to the application using a username and password combination. The username and password are compared to the stored values in an authentication source, such as a database or Lightweight Directory Access Protocol (LDAP). Once the user is authenticated, the groups that...
Change the font size
Change margin width
Change background colour