- Mobile Service
A mobile service accelerates your mobile app development by providing solutions for common mobile development use cases such as Push notifications. Mobile services are hosted on OpenShift and you use the OpenShift console to provision and associate services with your mobile apps. For more information, see Mobile Services.
- Mobile Client
A Mobile Client is the representation of a mobile app in an OpenShift project. This allows you connect and disconnect an app with any mobile service in the same OpenShift project. For more information, see Registering a mobile app.
- mobile app
A mobile app is your code for Android, iOS, Cordova or Xamarin that uses Mobile Services.
You can associate a Mobile Service with a mobile app to allow your mobile app use the mobile service.
- Mobile Services configuration file
mobile-services.jsonfile provides the information your mobile app needs to use Mobile Services.
Your server-side code, typically Node.js or Java. You can register the URL for each back-end service while provisioning the Runtime Connector service. This URL is available to the mobile app from the
This section describes terminology that is associated with Identity Management.
Single Sign On, the ability to share a login between multiple services
- OpenID Connect
a standard for providing identity on top of OAuth 2.0
Red Hat’s implementation of SSO and OpenID used as the identity provider
- Client ID
is the client identifier for OpenID Connect requests, a simple alpha-numeric string
- User Attributes
additional properties for user accounts (besides name and email) managed by Keycloak
This section describes terminology that is associated with Push Notifications.
- Push Application
A logical construct that represents an Mobile App, for example, Mobile HR.
- Push Notification Message
A simple message to be sent to a Push Application.
- Sender Endpoint API
A RESTful API that receives Push Notification Message requests for a PushApplication or some of its different Variants. The Server translates this request into the platform specific details and delivers the payload to the 3rd party cloud provides, which eventually might deliver the message to the physical device.
A variant of the Push Application, representing a specific mobile platform, like iOS or Android, or even more fine-grained differentiation like iPad or iPhone. There can be multiple variants for a single Push Application (for example, Mobile HR Android, Mobile HR iPad, Mobile HR iOS free or _Mobile HR iOS premium). Each supported variant type contains some platform specific properties, such as a Google API key (Android) or passphrase and certificate (Apple).
Represents an actual device, registered with the UnifiedPush Server. User1 running HR Android app, while User2 runs HR iPhone premium on his phone.
- Administrative User Interface
(AUI) The Unified Push Admin UI Web UI that allows you manage Push Applications and Variants, view statistics and send Push Notifications to devices.
//// start custom/ref_terminology.adoc[leveloffset=+1] :leveloffset: +1
//// start metrics/ref_terminology.adoc[leveloffset=+1] :leveloffset: +1
This section describes terminology that is associated with Mobile CI/CD.
Continuous Integration / Continuous Development
A tool that helps to automate the software development process, with continuous integration and facilitating continuous delivery.
A single run of Jenkins against a source code repository.
The result of a succesful build in Jenkins, this is the binary that can be installed on to a mobile device.
This is a file contained in the source code repository which instructs Jenkins on how to build an artifact with this source code.
- Root Access Detection (NOT_ROOTED)
Use it to help prevent your app running in a device that has been rooted/jailbroken. A device is considered rooted if any of the following are true:
A custom key has been used to sign the kernel
subinaries are present
- Developer Mode Detection (NO_DEVELOPER_MODE)
To detect if Developer Mode has been enabled on the device the
SecurityCheckType#NO_DEVELOPER_MODEfunction can be used. This function uses Android’s
- Debugger Detection (NO_DEBUGGER)
To detect if an Android debugger is attached to the app the
SecurityCheckType#NO_DEBUGGERfunction can be used. This function uses Android’s
- Emulator Detection (NOT_IN_EMULATOR)
To detect if the app is being run on an emulator the
SecurityCheckType#NOT_IN_EMULATORfunction can be used. This function uses Android’s
- Device Lock Detection (SCREEN_LOCK_ENABLED)
To detect if a device has a lock screen set (with pin, fingerprint, pattern) the
SecurityCheckType#SCREEN_LOCK_ENABLEDfunction can be used. This function uses Android’s
- App Data Backup Detection (ALLOW_BACKUP_DISABLED)
To detect whether the application’s data is configured to be synchronized across devices the
SecurityCheckType#ALLOW_BACKUP_DISABLEDfunction can be used. The
allowBackupflag determines whether to allow the application to participate in the backup and restore infrastructure, which might be interesting to avoid depending on your app’s needs.
- Device Encryption Detection (HAS_ENCRYPTION_ENABLED)
To detect whether the devices' filesystem is encrypted the
SecurityCheckType#HAS_ENCRYPTION_ENABLEDfunction can be used. This function uses Android’s