Skip to content

SVYX-206 - Add cyber security features to svySecurity#31

Open
SteveHawes wants to merge 3 commits intoServoy:masterfrom
SteveHawes:feature/SVYX-206
Open

SVYX-206 - Add cyber security features to svySecurity#31
SteveHawes wants to merge 3 commits intoServoy:masterfrom
SteveHawes:feature/SVYX-206

Conversation

@SteveHawes
Copy link

Added the ability to log failed logins and auto-lock a user if they have too many failed login attempts. Also updated the svySecurityUX project to include the ability to view/search/filter failed logins when viewing the user details.

I have not implemented my suggestion of using svyProperties for the configuration variables but have opted to use scope variables for now to match the existing implementations but I can amend it to use svyProperties if you want.

…r if they have too many failed login attempts. Also updated the svySecurityUX project to include the ability to view/search/filter failed logins when viewing the user details.
@seanthomasdevlin
Copy link
Member

Hi Steve,

Thanks for submitting this. It will be under review for a while as we are about to ship a new build of svySecurity. We have been holding off on any new features which introduce expansion of the data model (new tables for things like failed logins, password histories, etc.) We will revisit these kinds of features later this year.

Best,
Sean

@SteveHawes
Copy link
Author

SteveHawes commented Apr 5, 2021 via email

@pruhsert
Copy link
Member

pruhsert commented Apr 5, 2021

Thanks for letting us know about the user_name field length. There were actually three tables that were missing that change. Fixed that now.

@SteveHawes
Copy link
Author

SteveHawes commented Apr 5, 2021 via email

@seanthomasdevlin
Copy link
Member

seanthomasdevlin commented Apr 6, 2021

We cannot assume they have generated the UUID values for upgraded implementations (That must be done by import hook, or some other trigger) so we still want to default back to username if no ID is present.

That is easy, but a bigger question is what to do with the 2nd arg of the login method. Because it is kind of conflicting with the user UID, if they have one. Perhaps we can check the user uid and if it is conflict then we can log a warning that is ignored.
We have already documented this:

BUGFIXES:

HOUSEKEEPING:
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants