Abstract:
Disclosed are examples of systems, apparatus, methods and computer program products for providing components for building web applications within remote systems. A component database for web application components and an application database for web applications can be maintained in a multi-tenant database system. A first request can be processed to provide a web application for use at a remote site associated with a developer. Authorization of the remote site by the multi-tenant database can be determined based on a list of allowed remote sites for web applications. Data associated with the web application can then be sent to the remote site. A second request can be processed to provide a component for use at the remote site, indicating a component location of the remote site. Data associated with the first component can then be sent to the remote site. The data can be capable of causing an instance of the first component to be included at the component location of the remote site.
Abstract:
Disclosed are methods, systems, and computer program products for storing client-side information for identifying and requesting server-side actions. In some implementations, a computing device maintains a local cache storing client-side information maintained according to a local caching policy. The local cache includes responses received from the server in relation to performance of server-side actions based on requests previously communicated to the server. The local cache further includes an identifier of each server-side action associated with a respective response. The computing device receives, via a first component, a first request to perform a first server-side action. The computing device receives, via a second component, a second request to perform a second server-side action. The computing device determines, based on the local caching policy, that the first and second requests should be communicated to the server, and causes the first and second requests to be communicated to the server.
Abstract:
Disclosed are methods, systems, and computer program products for storing client-side information for identifying and requesting server-side actions. In some implementations, a computing device maintains a local cache storing client-side information maintained according to a local caching policy. The local cache includes responses received from the server in relation to performance of server-side actions based on requests previously communicated to the server. The local cache further includes an identifier of each server-side action associated with a respective response. The computing device receives, via a first component, a first request to perform a first server-side action. The computing device receives, via a second component, a second request to perform a second server-side action. The computing device determines, based on the local caching policy, that the first and second requests should be communicated to the server, and causes the first and second requests to be communicated to the server.
Abstract:
Disclosed are examples of systems, apparatus, methods and computer program products for providing components for building web applications within remote systems. A component database for web application components and an application database for web applications can be maintained in a multi-tenant database system. A first request can be processed to provide a web application for use at a remote site associated with a developer. Authorization of the remote site by the multi-tenant database can be determined based on a list of allowed remote sites for web applications. Data associated with the web application can then be sent to the remote site. A second request can be processed to provide a component for use at the remote site, indicating a component location of the remote site. Data associated with the first component can then be sent to the remote site. The data can be capable of causing an instance of the first component to be included at the component location of the remote site.
Abstract:
Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications. Documents for a web-based application are received, with the application containing custom components and Application Programming Interface (API) components. A Document Object Model (DOM) is processed corresponding to the web-based application, with the components modeled in hierarchical form. Each API component is assigned to a system mode setting, where the system mode setting is configured to provide the API component access to all of the components in the application. One or more secure documents are generated for each custom component, with each secure document containing a key in accordance with the rules of capability security. Each custom component is then assigned to a user mode setting, where the user mode setting is configured to provide custom components access to other components in the application for which a key can be provided.
Abstract:
Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications. Documents for a web-based application are received, with the application containing custom components and Application Programming Interface (API) components. A Document Object Model (DOM) is processed corresponding to the web-based application, with the custom and API components modeled in hierarchical form. For each custom component, a key is assigned in accordance with the rules of capability security, accessible custom components are identified for which the custom component can provide the assigned key, a virtual DOM is generated for the custom component with the component and identified accessible custom components being modeled in hierarchical form, and the custom component is prohibited access to all inaccessible custom components.
Abstract:
In embodiments, methods and systems for customizing a user interface to an on-demand database service. These mechanisms and methods for customizing a user interface to an on-demand database service can enable embodiments to provide a user interface designed by a tenant of the on-demand database service. The customization can include including third party content into the customized user interface, overriding a standard object, and providing content inline at a specified location.
Abstract:
In accordance with embodiments, there are provided mechanisms and methods for providing a client access to an external service via an application services platform. These mechanisms and methods for providing a client access to an external service via an application services platform can enable embodiments to provide effective access to such external service without necessarily forcing the client to access the external service separately with respect to the application services platform. The ability of embodiments to provide such technique can enable the integration of an external service with an application services platform, thus allowing the client to access the external service in a more effective manner.
Abstract:
In embodiments, methods and systems for customizing a user interface to an on-demand database service. These mechanisms and methods for customizing a user interface to an on-demand database service can enable embodiments to provide a user interface designed by a tenant of the on-demand database service. The customization can include including third party content into the customized user interface, overriding a standard object, and providing content inline at a specified location.
Abstract:
Disclosed are examples of systems, apparatus, methods and computer program products for providing a security model for component-based web applications. Documents for a web-based application are received, with the application containing custom components and Application Programming Interface (API) components. A Document Object Model (DOM) is processed corresponding to the web-based application, with the custom and API components modeled in hierarchical form. For each custom component, a key is assigned in accordance with the rules of capability security, accessible custom components are identified for which the custom component can provide the assigned key, a virtual DOM is generated for the custom component with the component and identified accessible custom components being modeled in hierarchical form, and the custom component is prohibited access to all inaccessible custom components.