web
You’re offline. This is a read only version of the page.
close
Skip to main content

Notifications

Announcements

Community site session details

Community site session details

Session Id :
Power Platform Community / Forums / Power Pages / Web Security in Portal...
Power Pages
Unanswered

Web Security in Portals - owasp recommendations

(1) ShareShare
ReportReport
Posted on by 1,214

Hi together,

i have questions about the general security of sites implemented with portals. We are implementing a kind of registration site which is a little bit complex and requires more than one step. We can not use advanced forms and use basic forms and pass the id of the data which is just edited from page to page with a get-parameter, so pretty much what everybody would do 🙂

 

Amongst others, my clients are concerned mostly about the following three things:

 

  1. when the url of this process is somehow stolen, another person can work on the same entity just by knowing this id.
    In the former version (which was adx with backend code) we just set a cookie in the very first page with a checksum and on each on and every request we could check, whether the request came from the same browser.
    I have no idea how to set cookies from PowerApps portals now.
    Are there some people out there who also have to make sure, that consecutive requests come from the same browser? How do you achieve that?
  2. We make heavy use of the webapi. This raises also a security issues: a person having know how of portals could just by gussing the attribute names spoil our process, because the api can be used from the console with no problems.
    Does anybody have an idea to prevent this? (i think its not possible by design and all websites which make use of their own api have this problem)
  3. Is there any documentation around which describes, whether portals are somehow vulnerable to DenialOfService attacks or other approaches? Is there any documentation around, whether the mechanisms and detections of azure apply to portals as well and the webserver is therefor somehow safe?

 

Any ideas and thoughts about this topics are highly appreciated

Thanks a lot,

  Christian

Categories:
I have the same question (0)
  • Christian Leverenz Profile Picture
    1,214 on at

    Hi together,

    meanwhile i got an answer from Microsoft to part of this:

     

    I was told, that Microsoft ensures Basic DDoS Protection on all Portal environments. I would have guessed so, but it is good to have it confirmed (well, yes, sort of inofficial but my client is ok with that).

     

    Another idea is to set up a WAF for the portal like described here: https://docs.microsoft.com/en-us/powerapps/maker/portals/azure-front-door#set-up-the-azure-front-door-endpoint-and-custom-domain-name . Shame on me, that i did not have that idea.

    This approach could also solve many other issues like blocking specific paths from specific locations or rate limiting requests (could also be done via api-managemant). The idea behind this to broaden your view on the infrastructure.

     

    I have no idea about the costs, but this is definitely something i am going to look at.

     

    Hope this helps a little bit,

      Christian

  • Verified answer
    oliver.rodrigues Profile Picture
    9,368 Most Valuable Professional on at

    A few points here:

    • Guessing the GUID of a record wouldn't be that simple, I think you can let your customer know that GUIDs are not like a sequential number and not anyone will just guess a correct GUID
    • You can add cookies / session values via JavaScript if you want additional validation
    • Definitely enable WAF as that can increase security 
    • Other steps you can take:
      • I always to try to convince customers to stay away from allowing personal data input while unauthenticated 
      • I have implemented a few times a simple authentication process, where users are given a Web Role that will only let them fill an onboarding/registration form
      • Then once approved they receive another Web Role that will give them access to more functionalities of the Portal
  • Christian Leverenz Profile Picture
    1,214 on at

    Hi @OliverRodrigues ,

    thats right, thanks. In fact, it is a site where users sign up for a service, so this is the exact case. Guessing is not esay, but stealing or sending via email is possible.

    The setting of a cookie via javascript could be an option but is only on the clientside. So, one could also set something in other storageplaces in the browser. But yes, can be done.

    The documentation says, that request.params will also carry cookies. Will try that out 🙂

     

    In fact, when the user really sends the data at the end, the entity is blocked from beeing shown in the portal by checking the statecode/statuscode in liquid. And unfinished signupos are deleted after a while. So, its a minimum vulnerability.

     

    Nevertheless: good to know, that its not only me caring for data security in portals - thanks for commenting.

     

    Have fun,

      Christian

Under review

Thank you for your reply! To ensure a great experience for everyone, your content is awaiting approval by our Community Managers. Please check back later.

Helpful resources

Quick Links

Forum hierarchy changes are complete!

In our never-ending quest to improve we are simplifying the forum hierarchy…

Ajay Kumar Gannamaneni – Community Spotlight

We are honored to recognize Ajay Kumar Gannamaneni as our Community Spotlight for December…

Leaderboard > Power Pages

#1
Jerry-IN Profile Picture

Jerry-IN 71

#2
Fubar Profile Picture

Fubar 62 Super User 2025 Season 2

#3
sannavajjala87 Profile Picture

sannavajjala87 31

Last 30 days Overall leaderboard