A security configuration determines the scope of user identity, authentication and authorization checks, and can be assigned to one or more domains for both messaging and replication-based applications. For example, user "John" may be authenticated one way in one security configuration, but authenticated differently another security configuration, even when "John" represent the same human user.
A security configuration aggregates various security mechanisms for protecting Unwired Platform resources under a specific name, which administrators can then assign to domains. Each security configuration consists of: