Configuring Account Locking due to Failed Login Attempts¶
WSO2 Identity Server enables privileged users to define the maximum number of failed login attempts the system accepts. When a user exceeds the maximum number of failed login attempts defined in the system, the user account will be automatically locked. The privileged users can also define for how long the account should be locked.
Scenario¶
Pickup is a cab company that has many employees who use different credentials to sign in to different internal enterprise applications. While Sam is an administrator at Pickup, Alex is a new recruit. To prevent unauthorized access, Sam wants to temporarily lock accounts to which more than 3 failed login attempts were made.
Let's learn how Sam implements this!
Set up¶
Follow the steps below to configure account locking due to failed login attempts.
-
Open the
deployment.tomlfile in the<IS_HOME>/repository/confdirectory and check whether the following listener configs are in place.[event.default_listener.identity_mgt] priority= "50" enable = false [event.default_listener.governance_identity_mgt] priority= "95" enable = true -
To configure the account locking requirements:
Try out¶
-
To create the user account for Alex:
-
To assign login permissions to the user:
-
To configure Alex's email account:
-
To mimic account locking:
-
Access the WSO2 Identity Server User Portal at
https://localhost:9443/user-portal/.
-
To mimic three consecutive erroneous login attempts, log in with Alex's user name and the following as passwords sequentially:
test123test234test345
-
An email that informs about the account locking is sent to the given email address.
-
Wait for 15 minutes and try to log in again with the correct credentials. The WSO2 Identity Server User Portal home screen appears.
-












