Security: Handling Keys and Cryptographic Operations
The security tutorials demonstrate how to use the following features in creating Tizen native applications:
-
Key Manager: Using Keys and Certificates, and Implementing Access Control
Demonstrates how you can create a secure repository for keys, certificates, and sensitive data.
-
Privilege Info: Managing Privilege Information
Demonstrates how you can display privilege information, such as the name and description of a given privilege.