IBM Worklight security overview
This chapter provides an architectural overview of the security capabilities of IBM Worklight. It also introduces the general security principles, concepts, and terminology with which Worklight is compliant.
This is your starting point for understanding these security capabilities. Subsequent chapters in this book delve deeper into each Worklight security feature, and provide details about how it can be used to secure your mobile application (app), its data, and access to your enterprise resources.
3.1 Security principles ...