Skip to main content




Service Studio version:

Secure the Applications

  • Edit
    Collaborate with us
    Edit this page on GitHub
  • Articles in this Section

    • Configure an Internal Network
      Configure the range of IP addresses that are considered part of your internal network.
    • Apply Content Security Policy
      Use the Content Security Policy (CSP) against code injection attacks in applications developed with OutSystems to protect against a growing number of attacks on the Web.
    • Enforce HTTPS Security
      Check how IT Managers or Administrators can override and enforce the HTTP security of OutSystems applications that are installed and running.
    • Encrypt web apps view state
      Secure the runtime of web application by encrypting the viewstate to protect sensitive information submitted by end users on the browser.
    • Protection against Brute Force Attacks
      Applications secured with authentication can be subject to brute force attacks that systematically try to guess user passwords. OutSystems provides a built-in protection mechanism that allows taking countermeasures against these attacks.
    • Use HTTPS by Enabling SSL
      Allow users to access your applications over HTTPS by enabling SSL in your infrastructure.
    • Use an External Authentication Provider
      OutSystems allows your IT users to authenticate using the same account they use in other corporate systems.
    • Implement an Authentication Plugin
      Learn the requirements an external authentication plugin must implement.
    • Configure App Authentication
      The authentication is configurable per environment to meet different security requirements.
    • Was this article helpful?