Security in Embedded Applications
You can prevent the host (embedding) application from accessing the embedded application by using the properties of the embedded application.
| Warning | Keep in mind that the embedded application is instantiated, regardless of access restrictions. The reason for this is that property values are only checked when the server-side listener detects an update on the client side. Always avoid including sensitive data in the constructor of an embedded web component. | 
Example: Setting a property from the host (embedding) page and checking it inside an embedded application.
Source code
HTML
<!doctype html>
<head>
  <link rel="import" href="web-component/my-comp.js">
  <script type="text/javascript">
        function login(){
            // request token for the current user
            // somehow
            var token =
                "d9f6a737-b2b8-46a7-a834-209c8b214969";
            var comp = document.querySelector(
                "#embedded-web-component");
            comp.token = token;
        }
  </script>
</head>
<body>
  <p>
    Web components implemented using server side Java
  </p>
  <button onclick="login()">Login</button>
  <my-comp id="embedded-web-component"></my-comp>
</body>- 
The my-compelement is embedded in a static page.
- 
The tokenproperty is set from a JavaScript function that retrieves it within theloginfunction (that’s invoked on the log-in button click).
Example: Associated web component and its exporter class.
Source code
Java
public class EmbeddedComponentExporter
       extends WebComponentExporter<EmbeddedComponent> {
    public EmbeddedComponentExporter() {
        super("my-comp");
        addProperty("token", "")
                .onChange(this::authorize);
    }
    @Override
    protected void configureInstance(
           WebComponent<EmbeddedComponent> webComponent,
           EmbeddedComponent component) {
    }
    private void authorize(EmbeddedComponent component,
                           String token) {
        // check the token
        if (isValidToken(token)) {
            component.init();
        }
    }
    private boolean isValidToken(String token) {
        return true;
    }
}
public class EmbeddedComponent extends Div {
    public EmbeddedComponent() {
        // Don't retrieve any sensitive data here
        // without granted access (via security token)
    }
    public void init() {
        // Initialize your secured component here
    }
}- 
The embedded web component is instantiated before the exporter instance receives the token value. For this reason, avoid retrieving or initializing components with sensitive data in the constructor. Do your initialization only after the valid token value is received. 
| Note | If you can’t prevent the initialization of the web component in the constructor, you can wrap it in a container, such as Div.
Create aDivsubclass (instead of usingEmbeddedComponent) and add anEmbeddedComponentinstance into theDivsubclass when the token is validated. | 
| Note | If you use a dependency injection (DI) framework, keep in mind that EmbeddedComponentExporteris instantiated directly without DI, and you may not use this instance to inject anything from the DI context.
As a workaround, you can create a wrapper component that’s instantiated within the DI context, and then use the wrapper instance to access the DI context. | 
A41A5F89-0D72-4F04-AD96-558968FEA7B2