User Tools

Site Tools


password_policies_login_protection_strong_authentication

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
password_policies_login_protection_strong_authentication [2016/09/06 10:51] lucypassword_policies_login_protection_strong_authentication [2019/03/01 14:03] lucy
Line 11: Line 11:
   * Require Digits within the password and set the number of required digits   * Require Digits within the password and set the number of required digits
   * Require Special Characters within the password and set the number of required Special Characters   * Require Special Characters within the password and set the number of required Special Characters
-  * Require Upper and lower Case Characters within the password+  * Require Upper and Lower Case Characters within the password
   * Rotation period: force the user to change the password after a custom time frame   * Rotation period: force the user to change the password after a custom time frame
  
Line 18: Line 18:
  
 If you enable the security image within the login page the user will have to enter a captcha text together with his login which will protect the login from automated login attempts (see https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks).  If you enable the security image within the login page the user will have to enter a captcha text together with his login which will protect the login from automated login attempts (see https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks). 
 +
 +{{ login_protection_captcha.png?600 }}
  
  
Line 24: Line 26:
 Certificate-based authentication is the use of a Digital Certificate to identify a user, machine, or device before granting access to a resource, network, application, etc.  In the case of user authentication, it is often deployed in coordination with traditional methods such as username and password. Certificate-based authentication is the use of a Digital Certificate to identify a user, machine, or device before granting access to a resource, network, application, etc.  In the case of user authentication, it is often deployed in coordination with traditional methods such as username and password.
  
-In order to enable certificate based authentication for a LUCY user you need go into the user management (in settings) and within the specific user you have to enable the checkbox "certificate required". Before creating the certificate you need to save the changes. Once you enabled this setting you have to click on the certificate generation icon. After a few seconds you will be able to download the certificate.+In order to enable certificate-based authentication for a LUCY user you need to go into the user management (in settings) and within the specific user you have to enable the checkbox "certificate required". Before creating the certificate you need to save the changes. Once you enabled this setting you have to click on the certificate generation icon. After a few secondsyou will be able to download the certificate.
  
 {{ certificate_auth.png?600 }} {{ certificate_auth.png?600 }}
password_policies_login_protection_strong_authentication.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1