SUCCESS STORIES / IT Agility

Arming applications with an undisputed weapon prevent cyberattacks

How our secured SSO authorization using proof key systems​ helped the client achieve a 2X reduction in various online security threats

Background

Businesses these days are more digitally advanced than ever. Technological evolution paves the way for more sophisticated security threats on the other end. Mobile application security becomes paramount as users increasingly engage on mobile devices. Users expect secured data access and transactions, be it watching the news or checking email, instant messaging, online purchases, or banking.

Lack of mobile security allows hackers to access a user's personal life and leaks sensitive user data such as their location, banking information, personal information, and more.

Keeping customer trust at the heart of their brand, companies must ensure top-notch security for their information and resources.

menu-img

2Xreduction in
front-end application vulnerabilities

90%SQL injection vulnerabilities prevented

80%URL scheme vulnerabilities prevented

Client Situation

Our client, a US-based communication provider, had a vision and roadmap to bring most of its services to mobile devices. They wanted to provide their users easy, real-time, and seamless access to information, products, and services.

In moving towards a digital experience, the client ran into a few issues. They realized their authentication process was not strong enough and vulnerable to attacks due to the ineffective implementation of their authentication tokens and session management.

This situation urged the client to look for a way to facilitate secure access to resources through mobile apps without compromising performance.

Our SSO solution blended with the PKCE approach helped the client maintain its brand image by safeguarding its customer’s sensitive data.

Diagnosis

Our security experts performed a vulnerability analysis to discover potential
resource-sharing threats between user groups. We found that their existing approach had a security flaw that could lead to potential breaches.

The client encountered two major problems. Transmitting sensitive data through URL redirects was an easy way to trick the users during Single Sign-on (SSO) logins.

Secondly, although SSO was convenient for users, it posed serious risks to enterprise security with an increasing number of malicious apps. Besides, SSO logins via web and mobile apps were prone to attacks, quality concerns, and compliance issues.

To overcome the challenges mentioned above, the client had to embrace proven standards and constantly address security loopholes.

Solving It

The client had built multiple subsystems for every functionality, and those were responsible for providing resources and access to mobile applications. We implemented a Proof Key Code Exchange (PKCE) to provide secured access to all the applications.

The PKCE system was designed to prevent interception of the authorization code by malicious apps that had sneaked into the user’s device. Our solution, comprising secured SSO authorization with PKCE, safeguarded the mobile apps from unauthorized access. It provided additional security, protected user privacy, and increased customer satisfaction.

Post-implementation of our solutions, the client achieved a 2X reduction in various front-end application vulnerabilities that involved user authentication and authorization.​ They could also prevent 90% of SQL injection vulnerabilities and 80% of Privacy Violation and Cross Application Communication (URL Scheme) vulnerabilities.

Let’s connect

How can we help?

We'd love to hear from you.

Talk to a consultant