Servis-Rhino 4211B Guía de usuario Pagina 93

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 298
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 92
Remove white spaces and comments
Google Closure Compile Simple Optimization
In addition you can specify while files to include and exclude from the minification process. The
syntax of inclusion and exclusion is:
** matches any file.
* matches a file name (eg. *.js).
A ";" separates multiple entries.
An example might be "**/js/**; **/css/*.css".
Minification is only applied to desktop and web projects.
Minification should not be applied to files that have already had minification applied (eg. the Dojo
libraries).
File Concatenation
When an application is loaded, it may be comprised of multiple JavaScript and CSS source files. If
the app is a Web or desktop project, then each of these will result in another trip back to the server
to retrieve the file. To reduce the number of trips and hence improve over all performance,
Worklight provides a feature called "file concatenation" which concatenate multiple files together
into a single file. This single file is then loaded as a unit as opposed to loading each of the other
files one at a time.
Security
The features of a secure system can include the following concepts:
Authentication – The notion of proving that one is who one claims to be.
Authorization – The notion that when a task is attempted that one is allowed to perform that
task.
Confidentiality – The notion that no-one can see the information passing between the sender
and receiver.
Integrity – The notion that the information received is exactly the information transmitted
and it hasn't been tampered with during transit.
Nonrepudiation – The notion of proving that a delivered piece of information was indeed
delivered.
Access to a resource is protected through a named entity that is termed a "Security Test". The
Security Test is itself composed of a set of security checks that must be performed. Each security
check is defined as a Realm which defines how the credentials are collected (an Authenticator) and
how those credentials are validated (Login module).
The entries are defined in a configuration file called "authenticationConfig.xml" which is
part of ever Worklight project.
See also:
redBook – Securing your mobile business with IBM Worklight – 2013-10-07
Page 93
Vista de pagina 92
1 2 ... 88 89 90 91 92 93 94 95 96 97 98 ... 297 298

Comentarios a estos manuales

Sin comentarios