Learn what are the issues behind and how you can prevent this!
Sharing connections can be a powerful mechanism for collaboration, but it also poses significant security risks. Just imagine you have access to the Outlook or Gmail of a Co-Worker in your low and no code tool.
Thats why you should always use so called service connections, these should be the first-class objects in modern no-code/low-code platforms. This means connections between applications, other users, or entire organizations have been authorized based on client secret and client token, they are usually not binded to one specific user. Well anyway these applications can also be shared with users who should not have access to their underlying data. For example, if an application connects to a customer data store like a Salesforce CRM, then another user may be able to view customer data without any authentication checks being performed.
No-code/low-code applications aren't built in silos. Their impact is based on integrations across the organization's stack. Most platforms come built-in with a large set of connectors (APIs), which allow quick and easy connectivity. This means that connections can be shared among applications, with other users, or with entire organizations.
Most of the times you cannot limit the API scope even though it is today more important then ever, as Patrik Simek noted.
A citizen led developer creates a connection to their company e-mail account. They inadvertently click on the "share with everyone" option. Every person withinside the organization of the low and no code tool, which includes contractors and vendors, gains access to their company e-mail account. A malicious coperate-user triggers a "forgot password" form and makes use of the connection to get the reset URL via with the low and no code system and can overtake the account. Was pretty easy right?
To see records from a database, a creator writes a straightforward application. The application is set up such that each user can only view records that are relevant to them. The program is set up, though, so that the user is implicitly given access to the connection to the underlying database. A user of the program can connect directly to the database and have complete access to all records. You think this is out of this world? Check our GIF where we access a coaching group via this kind of access-level in slack.
Admin uses a service account to connect an application to their source code management system (i.e., GitHub). For easy integration, the supplied service account has full access to all repositories. Any internal user can take use of this link to gain access to restricted repositories that they ordinarily wouldn't have. You just lost all your Code.
Many no-code/low-code platforms take advantage of OAuth permission procedures by querying, saving, and reusing user refresh tokens at will in order to boost productivity and speed up delivery. Because connections are linked with user identities that are challenging to track or deny, business users can easily set them up without worrying about secrets or permissions. OAuth refresh tokens are intended to be temporary, yet they typically last for a few months or even years. As a result, a link made by a business user in less than a minute could remain in the no-code/low-code platform for a long time and frequently be utilized by other users for purposes other than those for which it was originally intended.
What can you do to prevent this?
The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.
A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text element to that field in the settings panel. Voila!
Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.
Secure your iPaaS & Automation environment so Citizen developers can work without harming your business.
ASERVMENT. Make Low- and No-Code Automation Compliant and guide citizen developers.