Skip to main content

 

Managing the Applications Lifecycle

 

Applies only to Mobile Apps and Reactive Web Apps

 

OutSystems

Configure App Authentication

  • Edit
  • The document is about configuring app authentication in the environment. There's also information about the authentication mechanism, including the explanation about cookies.

    Configure App Authentication Settings

    The setting Single sign-on between app types (SSO) is available in Platform Server 11.8 and later.

    OutSystems authentication mechanism is configurable per environment to meet different security requirements.

    You can configure general authentication settings and also specific settings for persistent and session authentication.

    The following setting applies to both persistent and session authentication:

    • Cache Time In Minutes – Number of minutes the authentication information sent by the device is considered valid by the server without the need to fetch it from the database. After this time, the server validates the authentication tokens against the information stored in the database and supplies new authentication tokens. If set to 0, the authentication cache mechanism is disabled.

    • Single Sign-On Between App Types - When activated, this option lets users navigate between Traditional, Reactive Web Apps, and Mobile Apps distributed as Progressive Web Apps without having to sign in again. For example, if users sign in into a Traditional Web App, and then navigate to a Reactive Web App, they are signed in automatically in the Reactive Web App. To activate the Single Sign-On Between App Types setting, you need to have HTTPS enabled in the environment.

    The following settings are used for persistent authentication:

    • Max Idle Time – The maximum number of days a user stays logged in (in the server) without communicating with the server. After this time passes, the user needs to log in again if the application goes online (connects to the server).

    • Cookie Expiration – The maximum number of days a user stays logged in (in the application) without communicating with the server. After this time the cookie expires and the application needs to go online (connect to the server) and the user needs to log in again.

    The following setting is used for session authentication:

    • Max Idle Time – Number of minutes between server calls that a user authentication is recognized by the server as being valid.

    To configure the authentication settings for apps in your OutSystems environment, do the following:

    1. Go to the Service Center management console of your OutSystems environment.

    2. Go to the Administration section and select the Security tab.

    3. Select the Applications Authentication area:

      Applications Authentication settings in Service Studio

    In this page you can also generate new keys for authenticating and encrypting cookie values. This will force all the users of your apps to login again in the next server request. To generate new keys, press the Generate button in Authentication and Encryption Keys area:

    The Generate button for new Authentication and Encryption Keys

    Authentication Types

    The server handles the authentication cookies according to the type of authentication. There are two types of authentication:

    • Session authentication – The authentication cookies are destroyed when the end user closes the app.
    • Persistent authentication – The authentication cookies persist across multiple application starts.

    The developer specifies the authentication type in the RememberLogin parameter when calling the action User_Login to login the users.

    Authentication Cookies

    When the end user logs in, the server sends two authentication cookies to the app. These cookies let the end user to be authenticated in the subsequent server requests. This section describes the two cookies used in the authentication mechanism of an OutSystems app.

    Cookie nr1<User Provider Name>:

    • The server uses the cookie to enforce session expiration as needed.
    • Contains information needed to ensure session authenticity.
    • Its HttpOnly flag is set to true and the cookie can't be accessed through JavaScript.

    Cookie nr2<User Provider Name>:

    • Provides information to the application code about the user identifier via the built-in function GetUserId.
    • Contains information needed to avoid CSRF attacks.
    • Its HttpOnly flag is set to false and the cookie can be accessed through JavaScript. Don't change the HttpOnly flag of the nr2 cookie to true, as that can cause unexpected behavior of the apps.

    Verifying Authentication Cookies

    When executing a server call, the app sends the authentication cookies to the server, with a CSRF token in the X-CSRF-Token request header.

    The server validates the request by checking the following conditions:

    1. The request includes the X-CSRF-Token header.
    2. The request contains the two authentication cookies.
    3. Cookies information is authentic and was not forged.
    4. Login expiration period has not been reached.

    If all conditions apply, the server authenticates the request as coming from the user identified in the cookies, otherwise the server processes the request as if it was coming from an anonymous user.

    Authentication flow

    Authentication Cache

    The authentication mechanism for apps includes caching capabilities to avoid the overhead of validating and updating authentication information in the database upon each request.

    Within a defined period of time the server uses the information stored in the cookies to authenticate the requests of an authenticated session, instead of retrieving the authentication information from the database.

    • Was this article helpful?