Configuring Block User Login

Prev Next

Overview


To protect against password-guessing attacks, the system supports two types of login blocking mechanisms: Soft Blocking and Hard Blocking.

  • Soft Blocking temporarily disables the login page after a set number of failed login attempts. Users are prevented from logging in during this time but may still use the “Forgot your password” feature. After the defined blocking period, access is automatically restored.

  • Hard Blocking deactivates a user account after repeated failed attempts. Once inactive, the user cannot log in or reset their password. Reactivation requires administrative action.

Where to find Block User Login


To locate the Block User Login settings, navigate to System Configuration → Users → Block User Login. This section allows you to configure both soft and hard blocking options to enhance account security.

blocking_settings.png

Soft Block Configuration


To activate soft blocking functionality, configure the following parameters:

Parameter name

Description

Enable

This parameter enables soft blocking, which prevents further login attempts by temporarily blocking access to the login page. It is disabled by default.

Number of Failed Attempts before Blocking

Specifies the number of failed login attempts after which the login page will be blocked to prevent further attempts. The default value is 3.

The duration in seconds that the login page will be blocked after the user reaches the number of failed login attempts specified in the Number of Failed Attempts Before Blocking property. The default duration is 20 seconds.

Number of Failed Attempts Before Sending an Email

The number of failed login attempts that trigger sending an email notification about a possible attack.

Template for the emails sent to notify the addresses specified in the Email Address property about a possible attack.

Blocking mail properties

Includes placeholders that will be replaced with actual data:

  • ${date} — Date when the attack occurred

  • ${time} — Time when the attack occurred

  • ${sysName} — Name of the system (as specified by the systemName property)

  • ${userName} — Name of the user whose account was targeted

  • ${times} — Number of failed login attempts

  • ${ip} — IP address of the last unsuccessful login attempt

  • ${ipList} — List of all IP addresses from which failed login attempts originated

Note!

The number of already performed failed login attempts will be reset in the following cases:

  • After login page blocking time elapses

  • After the user logs in successfully

  • The user resets his password via the Forgot your password functionality

  • The application server is restarted

Hard Block Configuration


To activate the hard blocking functionality, configure the following properties:

Parameter name

Description

Enable

This parameter enables a hard block that deactivates a user after a specified number of failed login attempts. It is disabled by default.

Number of Failed Attempts before Blocking

The number of failed login attempts after which the user will be deactivated. Once inactive, the user will be unable to log in, even with correct credentials, and cannot reset their password via the “Forgot Your Password” feature. The default value is 10.

Seconds to Store Count of Unsuccessful Login Attempts

The period during which failed login attempts are recorded. After this period expires, the count of failed attempts resets to zero. The default duration is 24 hours, starting from the first failed login attempt.

Email Template

A template for the emails sent to notify the specified addresses (in the Email Address property) about a potential attack.

Notification

Configure alerts sent to admins or users when thresholds are reached:

Parameter name

Description

Email Address

The email address(es) to which notifications about a potential attack will be sent after the user exceeds the number of failed login attempts specified in the Number of Failed Attempts Before Sending an Email property. Multiple addresses can be specified, separated by commas.

Notify User

Enables sending a notification email to the user whose account is under attack. Emails are sent according to the threshold set in the Number of Failed Attempts Before Sending an Email property. Disabled by default.