ios - Bluemix Push service security concern -


we using ibm push-notification service , mobile-app-security on our bluemix app (serving ios clients).

in order send push notification, our server sends post request to: https://mobile.ng.bluemix.net/push/v1/apps/{application-id}/messages

with application secret in ibm-application-secret header (following instructions here).

to initialize mobile-app-security sdk inside our app need both application-id , application-secret - means app must contain these values (as constant parameters or download server). if malicious user fetches these values using simple reverse-engineering, able send same post requests, i.e. send push notifications other clients, right?

shouldn't there 2 application-secrets? 1 secret app (making hard fake registrations - i.e. require reverse-engineering) , 1 server (which allows send notifications , should never stored on client-side).

is possible initialize mobile-app-security ios sdk without application secret?

i understand concern. address questions:
-you must have app secret on client side in order authenticate mas , use push service (push relies on mas auth)
-we recommend implementing own form of security prevent malicious user obtaining app secret. example, encrypting file stores app secret, or app secret itself.

if looking more robust built-in level of security, recommend using newer mobilefirst services starter, support push , advanced mobile access service (ama), available ios 8.


Comments

Popular posts from this blog

android - MPAndroidChart - How to add Annotations or images to the chart -

javascript - Add class to another page attribute using URL id - Jquery -

firefox - Where is 'webgl.osmesalib' parameter? -