How to Secure Android & iOS Apps in Bitrise CI/CD Pipelines
This Knowledge Base article provides instructions for using the Appdome Build-2Secure step for Bitrise CI/CD pipelines. Appdome’s Build-2Secure step for Bitrise is an out-of-the-box Bitrise CI/CD integration, making it…
How To Implement Threat-Events in Java
To implement Threat Events:
Create a class that extends from Application class.
public class MyApplication extends Application {
@Override
public void onCreate()…
Implementing Threat Events – Best Practices
On Android mobile devices, security events are usually implemented by using Broadcasts and BroacastRecievers, which by default are freely broadcasted to all applications on the device. This mechanism is…
How to Detect GPS Spoofing, Location & Fake GPS Spoofing in Android Apps
…
How to Detect Unlocked Bootloader in Android Apps
…
How to Use Secure Android & iOS Apps in GitHub CI/CD
Actions are reusable snippets of code that help automate repeated processes, speed up project setup, and make it easy to integrate with third-party tools.
Now you can easily secure and…
How to use Appdome build-2secure in Azure Pipelines
With Appdome build-2secure, you can easily secure and customize your mobile apps on Azure Devops by using the Appdome build-2secure extension. No coding or technical expertise is required. Automate…
How to Integrate Appdome and AzureAD with OAuth2.0 Login
OAuth 2.0 & Microsoft Azure Setup
Prerequisites
Appdome uses AzureAD with OAuth2.0 login:
https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow
Appdome requires the following permissions:
User.Read
profile.
Appdome extracts the following information from Azure:
givenName surname<br…
Configuring Appdome Authentication via Okta
This guide details the steps and the necessary data required for properly configuring Okta. Okta is an identity management service that allows IT to manage any employee’s access to any application or device….
How to Perform Passkey Authentication on Appdome
This Knowledge Base article provides instructions for implementing Passkey Authentication when using Appdome.
What is Passkey Authentication?
A passkey is an alternative method of user authentication. While traditional login methods…
How To Generate ThreatScope SnapShots™ on Appdome
Threat Snapshots allow users to easily export and share the ThreatScope information with relevant team members.
The Threat Scope data is updated every 24 hours, enabling the user to use Threat Snapshots to compare data from different date ranges, threat types and geographical areas. Incorporate the Threat Snapshots in progress reports or presentations and share with management, third party vendors or security and dev teams.
How to Use Localized Messages to Display App Compromise Notifications in Different Languages
Appdome detects various security threats during the application runtime, both when the app is launched and while it is running. When a threat is detected, Appdome responds based on…