Blog
Introducing The Generated Columns Feature
Backendless version 5.7.3 introduces generated columns, a new feature of the Backendless Database. Using this feature, you can declare a new type of column for which the database calculates the values based on a specified expression. These new columns function much like formulas in your favorite spreadsheet application. When you add a generated column, you…

How to Use Custom API Keys

Custom API keys may not seem like the most exciting feature of Backendless, but the flexibility that they provide is extremely valuable. In this article, we are going to take a closer look at this unheralded feature.

How to Manage a Data Object’s ACL Using API

In another post, we described how to adjust an object’s access control list (ACL) using Backendless Console. As we mentioned, in addition to Backendless Console, the object’s permissions can be controlled using API.

How to Assign Roles to Users Using Backendless Console

In another post, we wrote about how to create developer-defined security roles and how to secure data table access for a security role. Ultimately when a client application makes API requests, the security evolves around users, since it is a user who authenticates themselves against the system.

How to Restrict Access to Files Using Backendless Console

In another post, we described how to obtain a file’s public URL using Backendless Console. Even though anyone can obtain a public URL for a file or directory, it is very easy to change the permissions to restrict file download for anonymous (not authenticated) users.

How to Lockout a User Account Upon Unsuccessful Logins

It has happened to a lot of people, especially with the online banking applications – you try logging in a couple of times and get your password wrong. Then the screen changes saying the account is locked out and you need to try again in XX minutes.

How to Block Access to All Data for Guest Users

Your application can use the Backendless API to access data, run searches, and store, update and delete objects in the database. When users authenticate themselves with the backend, all subsequent API calls are executed on the behalf of the logged-in user.

How to Define User Roles – An Essential Block to Securing Your App Data

In a Backendless backend, you can restrict access to API operations and/or application data. A restriction may apply either to specific users or to roles. When a restriction applies to a role, it automatically applies to the users in that role.

How to Secure Access to a Data Table for a Security Role

In another post, we described how to restrict access to all data for “guest” users. The Backendless security model lets you control access to data tables, or more generally “asset containers”, at the role and operation levels. That means an application developer can set up security restrictions for API operations on a specific data table…

How to Load Data Objects Belonging to the Logged-In User (Owner Policy)

A user on StackOverflow asked how to load only the data that belongs to the currently logged-in user. This is indeed an interesting and very common use-case. Backendless handles it beautifully and this feature certainly deserves a place among our Recipes.