Skip to content

Commit

Permalink
Add login throttling mechanism description
Browse files Browse the repository at this point in the history
  • Loading branch information
zedzior committed Jul 4, 2024
1 parent a8451ad commit eb4419c
Showing 1 changed file with 6 additions and 0 deletions.
6 changes: 6 additions & 0 deletions docs/api-usage/authentication.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -423,6 +423,12 @@ sequenceDiagram
You can find an example implementation of the authentication flow here: [saleor-next-starter](https://github.com/saleor/saleor-next-starter/tree/main/src/auth).
:::

### Login throttling

To prevent accounts from credential-guessing attacks, Saleor uses login throttling. First, it blocks concurrent login requests originating from the same IP address for the duration of the authentication process.
Next, if the user fails to log in due to an invalid password, the block time will be extended by a power of 2 seconds. In case of an unknown email address, the policy is loosened and the delay of the next login attempt
will be extended after every 10 attempts. The maximum time for a user's IP can be blocked is set to 60 minutes. The throttling mechanism will be reset after a successful login attempt.

## User authentication using OpenID Connect

OpenID Connect (OIDC) is an [OAuth 2.0](https://oauth.net/2/) extension allowing the transfer of identity information between the client and the authorization server.
Expand Down

0 comments on commit eb4419c

Please sign in to comment.