O'Reilly logo

Securing Your Mobile Business with IBM Worklight by Madlin Seidel, Dale Sue Ping, Jia Lei Ma, Virginijus Kaminas, Juarez Barbosa Junior, Scott Andrews

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Applying Worklight security features
IBM Worklight provides various security features that can be used by managing and configuring the client side and server side. This chapter provides information about all of these features:
Use Worklight to secure sensitive personal data through the use of the encrypted offline cache. You can also use JavaScript Object Notation Store (JSONStore) to maintain a local secure copy of the application (app) data.
Worklight provides strong authentication mechanisms, and ensures that only authorized users have access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required