TSU-07 concerns security issues that arise from custom-built authentication in Mendix applications. Mendix provides standard authentication using a username/password combination and sessions. In practice, this is often not sufficient. Applications may, for example, require additional forms of authentication, such as:
Mendix offers several ways to implement such custom authentication, including:
Authentication is complex. If this custom authentication is implemented incorrectly, it can lead to unauthorized access to the application, integrations, or request handlers. The security of a mechanism (such as JWT or SAML) strongly depends on:
The more customization is required in these areas, the greater the risk of errors and, therefore, of security vulnerabilities.
When adding custom authentication to a Mendix application, it is important to limit custom development as much as possible. Where customization is required, you must thoroughly understand and apply the best practices of the chosen mechanism.
The following guidelines help with that:
These are the most common risks associated with insecure custom authentication
Recognize and prevent vulnerabilities in Mendix at an early stage?
Explore our updated Mendix security trainings based on The S-Unit Top 10.
Want to know how your Mendix application scores against The S-Unit Top 10? In collaboration with Omnext, we have developed a Mendix-specific SAST solution that continuously and automatically scans for vulnerabilities. By integrating The S-Unit Top 10 into the CI/CD pipeline, risks are identified early and made immediately visible. Learn more about our collaboration with Omnext and the Mendix-specific SAST module.