Beyond Passwords Workshop
How do certificates and cryptography actually protect your Mendix applications? We’ll break down HTTPS, PKI, and encryption in simple terms – and show you how to implement them effectively. From HPPTS to Public Key Infrastructure. Symmetric vs. Asymmetric Cryptography and Authority vs. Client Certificates. No security expertise is required.