MobileTogether Server is the back-end hub for your enterprise solutions and app store apps built using MobileTogether Designer. It acts as a gateway between end-users and your back-end data sources and infrastructure. In addition to numerous high-performance app hosting features, MobileTogether Server supports definition of a variety of granular security options, both on a per-server basis and a per-app basis.
An easy-to-use web interface and permissions editor makes it easy to enable and manage roles, authentication, and encryption.
MobileTogether apps and enterprise solutions support SSL encryption between the mobile app and the back-end server. MobileTogether uses the open-source OpenSSL toolkit to manage encryption with SSL enabled via a private key and certificate. Certificates can be obtained in one of two ways:
Either option can be configured in the SSL Dialog of the MobileTogether Server web interface (as shown in the video below). For simplicity, third-party Let’s Encrypt integration allows you to request a free SSL cert from within the MobileTogether Server interface. Then, MobileTogether Server will automatically renew the certificate with Let’s Encrypt every two months.
The MobileTogether Server web-based interface makes it easy to set up user accounts for both server admins and enterprise app end users, as well as define and assign roles and privileges. This ensures that users only have access to the features and data they need. Permissions can be set at various levels, allowing for fine-grained access control with a hierarchical flow.
The Privileges Report tab provides a comprehensive view of the assigned privileges at a glance with reports sorted by permissions and by users.
Strong password-based authentication is available for both server access by admins and end user access to your apps and enterprise solutions. Flexible authentication options include:
For directory-based logins, there is an option to allow any existing domain user to log in or to import a subset. This support allows apps to authenticate users against existing corporate directories, providing seamless integration with enterprise security systems.
Developers can also implement their own authentication mechanisms to meet specific security requirements.
Comprehensive logging of user activities and access supports the detection of unauthorized access or suspicious activities. The Log tab of the MobileTogether web console reports the logged actions — including changes to server settings (who and when). Logs can be filtered and/or sorted to zero in on a particular date, user, solution, or severity level (info, warning, error).