Typical Workflow for Securing Oracle JET Applications

Understand how to secure your Oracle JET application. Optionally, understand how to use the oj.OAuth plugin to manage access to client (end user) private data.

To develop secure Oracle JET applications, refer to the typical workflow described in the following table:

Task Description More Information

Understand Oracle JET application security

Identify Oracle JET security features and which tasks you should take to secure your Oracle JET application.

About Securing Oracle JET Applications

Use oj.OAuth

Use Oracle JET oj.OAuth plugin.

Using oj.OAuth in Your Oracle JET Application