Security:
The plugin incorporates validations, threat detection (ThreatDetector ), and secure token storage. It is important to correctly configure allowed_origins to restrict communication and prevent code injection.
Optimization:
Caching techniques and batch request handling are applied to improve performance without requiring additional configurations, except in specific cases.
Themes and Design:
Use the theme and list.layout.type fields to adapt the picker's appearance to match your application's visual identity.
Was this page helpful?
Thank you for your feedback!
Please Login First
We use cookies to enhance your experience on our website. By continuing to browse, you agree to our use of cookies. Learn more in our Privacy Policy
Comments (00)