Skip to content

V4: Authentication and Session Management Requirements

Control Objective

In most cases, users logging into a remote service is an integral part of the overall mobile app architecture. Even though most of the logic happens at the endpoint, MASVS defines some basic requirements regarding how user accounts and sessions are to be managed.

Security Verification Requirements

# MSTG-ID Description L1 L2
4.1 MSTG-AUTH-1 If the app provides users access to a remote service, some form of authentication, such as username/password authentication, is performed at the remote endpoint. x x
4.2 MSTG-AUTH-2 If stateful session management is used, the remote endpoint uses randomly generated session identifiers to authenticate client requests without sending the user's credentials. x x
4.3 MSTG-AUTH-3 If stateless token-based authentication is used, the server provides a token that has been signed using a secure algorithm. x x
4.4 MSTG-AUTH-4 The remote endpoint terminates the existing session when the user logs out. x x
4.5 MSTG-AUTH-5 A password policy exists and is enforced at the remote endpoint. x x
4.6 MSTG-AUTH-6 The remote endpoint implements a mechanism to protect against the submission of credentials an excessive number of times. x x
4.7 MSTG-AUTH-7 Sessions are invalidated at the remote endpoint after a predefined period of inactivity and access tokens expire. x x
4.8 MSTG-AUTH-8 Biometric authentication, if any, is not event-bound (i.e. using an API that simply returns "true" or "false"). Instead, it is based on unlocking the keychain/keystore. x
4.9 MSTG-AUTH-9 A second factor of authentication exists at the remote endpoint and the 2FA requirement is consistently enforced. x
4.10 MSTG-AUTH-10 Sensitive transactions require step-up authentication. x
4.11 MSTG-AUTH-11 The app informs the user of all sensitive activities with their account. Users are able to view a list of devices, view contextual information (IP address, location, etc.), and to block specific devices. x
4.12 MSTG-AUTH-12 Authorization models should be defined and enforced at the remote endpoint. x x


The OWASP Mobile Application Security Testing Guide provides detailed instructions for verifying the requirements listed above.

For more information, see also: