User Security
Transcript Summary
Introduction
Today we're shining a spotlight on user security. Tadabase already provides industry-leading security for any users logging into your application, but we also offer additional methods that allow for complete customization and control of how users create accounts and log in.
User Security Settings
Under your app settings and user settings, we have several sections of additional security features that can be applied to your application. These include:
- Logging successful user logins.
- Logging IP addresses of users who log in.
- Capturing host information.
- Optionally requiring the user's location upon login.
Handling Failed Login Attempts
For failed login attempts, you can choose to log them and customize what happens after multiple failed attempts. For instance, after three failed attempts, you can block that IP address for a specified time. In this example, after three failed login attempts, the user will be blocked from logging in for one minute.
Demonstration of Failed Login Attempts
For this demonstration, I’ve purposely entered the wrong password multiple times. After three attempts, it blocks me and locks me out from signing in for one minute.
Admin Control of Failed Logins
From the admin's perspective, within the Builder, you can view failed login attempts and unblock users to allow them to try logging in again with the correct credentials.
Managing Active Sessions
Once someone is logged in, you can view their login history and active sessions. From the user settings section, you can log someone out if they are currently logged into the application. Clicking the logout button will force them out, and they'll be redirected to the login page next time they try to access a page.
Account Creation and Password Complexity
Tadabase allows you to set various password complexity options during account creation. These options include:
- Minimum number of characters.
- Requiring at least one number and one special character. You can also customize the message shown to users when they don’t meet these criteria.
Two-Factor Authentication (2FA)
Lastly, we offer two-factor authentication (2FA), which, once enabled, becomes active on the login component. You can customize how the 2FA form appears to users when they log in.
Demonstration of 2FA
After logging in with the correct email and password, the user will be prompted with a 2FA input box. They'll receive a six-digit code via email and will need to enter that code to complete the login process.
Conclusion
That’s a brief overview of the user settings and additional security features available in Tadabase applications. Thanks so much for watching. We'll see you in the next one!
We'd love to hear your feedback.