What is Ionic?

The Ionic Platform allows any developer to add data access, control and protection to their application with a few lines of code. With no background in data security or cryptography, you can quickly and confidently add data access management and protection to your application. There are several guiding principles and base capabilities built into the architecture that are important to understand:

  • AES-256 CTR or GCM data encryption.
  • Granular, real-time access control to data, using a consistent policy and attribute driven framework across all of your applications.
  • Visibility into all successful and unsuccessful access to protected data, including full context of all data access (requesting user, device, location, application, date and time of day).
  • Key Management that ensures only the enterprise controls their keys and that it is mathematically impossible for Ionic or anyone else to gain access to their keys. Ionic itself has no access or visibility to your keys.
  • Customer control and ownership of all users and device authentication. Authentication can utilize email tokens, SSOs (SAML/OAuth), or other methods.

Getting Started

Using RESTful API’s and the Ionic SDK, developers can easily add Ionic data access management and protection capabilities to applications that run on Windows, macOS, Linux, iOS and Android devices in a variety of common programming languages. Follow these four steps to get going.

  1. Request Account Send an email to dev@ionic.com with your email address and customer information to request access to the Developer Dashboard.
  2. Download SDK After requesting access and resetting your passsword, then you will be able to login to the Developer Dashboard to download the SDK.
  3. Enroll Your Device The enrollment process will require that you have created an Ionic account.
  4. Configure your IDE Once you enrolled a device, the configuration guides will walkthrough how to properly setup up your IDE.