Customization and extending capabilities is an important part of any application. This chapter discusses how to securely implement customizations and extensions such that they do not jeopardize application security.
If customization is required it should be done in such a way that no built-in explicit security features would be circumvented.
If additional integration credentials are required, the customization should store them in the Secure Credential Store along with all other RMS credentials.