Skip to content

Failed Logon Attempts Policy

Before you start

Goal

  • Define an appropriate policy for detecting and responding to failed logon attempts for internal Altair SLC Hub users

To guard against brute force attempts to crack passwords for Altair SLC Hub users, Altair SLC Hub can be configured to track failed logon attempts. This is disabled by default, but it is recommended to enable this if internal Altair SLC Hub users are used.

Configuration

The brute force detection policy is configured using the auth.bruteForceDetectionPolicy configuration section.

To create a custom brute force detection policy, create a new configuration file in the etc/config.d directory with a name such as passwordpolicy.yaml, with contents such as:

auth:
   bruteForceDetectionPolicy:
     enabled: true
     clearFailuresAfter: 12h
     maxLoginFailures: 5
     waitIncrement: 1m
     maxFailureWait: 15m
     maxTemporaryLockouts: 2
     permanentLockout: true

An example configuration, along with comments on the configuration settings can be found in the etc/config.d/auth.yaml configuration file.

Note that the configuration files in the etc/config.d directory are read in alphabetical order. However, there are no explicit settings in any installation supplied configuration files relating to the brute force detection policy, so the name of the file containing any custom brute force detection policy does not have to be alphabetically later than auth.yaml for it to have an effect.

Configuration Settings

clearFailuresAfter

This is the maximum time between logon failures that are considered. If a logon failure occurs more than this duration after the last one, the logon failure count is reset.

maxLoginFailures

This is the maximum number of logon failures before a lockout (temporary or permanent) is triggered.

waitIncrement

This the duration of any temporary lockout. Note that each subsequent temporary lockout increases by this amount but only up to the value of maxFailureWait.

For example, if maxLoginFailures is set to 2 and waitIncrement is set to 5m then after 2 logon failures the user will be logged out for 5 minutes. Then after 2 further logon failures the user would be locked out for 10 minutes, and so on, up to the value of maxFailureWait.

maxFailureWait

This is the maximum amount of time that a user will be temporarily locked out for on any given lockout.

maxTemporaryLockouts

This is the maximum number of times a user can be temporarily locked out before being permanently locked out. Only relevant if permanentLockout is true

permanentLockout

Indicates whether a user will be permanently locked out if the maximum number of temporary lockouts is exceeded.

Restart Altair SLC Hub

Having changed the password validation configuration, first verify that the configuration is read from the files correctly using the hubctl config print command:

hubctl config print auth.bruteForceDetectionPolicy

It is then necessary to restart the authentication service in order for the change in configuration to have an effect. Restart the service using the following command:

hubctl service restart auth