Best Practices: Configuration Security

Estimated Reading Time:  6  minutes

Overview

When building applications using the Unqork Designer Platform, security is vital. This is especially true if your application captures sensitive data. Or if your application uses schema modules to store submission data, contains external integrations using API (Application Programming Interface) calls, or opens API modules for external access. To improve your application's security, integrate Unqork's security best practices.

Application configuration security best practices covers modules, components, and workflows.

What You'll Learn

In this article, you'll learn how to implement best security practices for configuration in the following areas: