Grokking Web Application Security by Malcolm McDonald;

Grokking Web Application Security by Malcolm McDonald;

Author:Malcolm McDonald; [McDonald, Malcolm]
Language: eng
Format: epub
Publisher: Simon & Schuster
Published: 2024-05-13T22:00:00+00:00


Strengthening your authentication

Not everyone has a social media login or Gmail address, and SAML is generally used only in a corporate setting because supporting your own identity provider is a major undertaking. So even if SSO can lessen some of the burdens of authenticating your users, you’re likely to end up using some sort of in-house authentication. Let’s discuss some ways of making your authentication resilient to brute-force attacks.

Password complexity rules

Brute-force guessing of passwords relies heavily on finding users with guessable passwords. Hence, encouraging your users to choose less-guessable passwords reduces the possibility of a successful brute-force attack. This is the philosophy behind enforcing password complexity rules, which require users to choose passwords that match certain criteria. Following are some common criteria:

Passwords must be a minimum length.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.