IBM Worklight v5.0.5 > Develop IBM Worklight applications > Authentication configurationProtected resources
The types of resources that can be protected are:
- adapter procedures
- applications
- static IBM Worklight web applications, such as the IBM Worklight Console
The Application Center is not subject to the authentication model described here.
Parent Authentication configuration