Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Brute force protection for Auth0 #2472

Open
1 task
curtismchale opened this issue Jan 25, 2024 · 0 comments
Open
1 task

Brute force protection for Auth0 #2472

curtismchale opened this issue Jan 25, 2024 · 0 comments

Comments

@curtismchale
Copy link
Contributor

curtismchale commented Jan 25, 2024

Source
CM

We should lock an account if a password has been tried on it 5 times without success. I don't think we should put a time limit on it, or give any indication that they have a limited amount of tries. If there are 5 tries across a few weeks that don't work, we should still lock the account and the user can get in touch with us, or their site rep to get access to their account again.

I'd love to see a log action that we locked an account.

We may need to tweak the timeframe and number of attempts so that users aren't locked out too often.

Tasks

  • provide good user feedback via email about why a user account has been locked out and for how long
    • I don't think we want to provide this on the web interface and instead just say the account is "locked" as that would give someone trying passwords information that they didn't have about the capabilities of our systems
    • though it's also likely that the attempts are simply made by a bot which may/maynot be able to read the feedback given
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

No branches or pull requests

1 participant