expose 2F fail counter in SSO admin
Bug #1055692 reported by
Selene ToyKeeper
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Canonical SSO provider |
Confirmed
|
Undecided
|
Selene ToyKeeper |
Bug Description
When users fail their 2F login too many times (~20), SSO suspends their account. Then it requires an admin to help get their access back. This is fine.
However, the counter used to track failed 2F attempts isn't exposed in the admin UI, so users can get re-suspended immediately after being re-activated. This should probably be exposed so admins can reset it while re-activating the account.
The relevant variable is account.
tags: | added: twofactor |
Changed in canonical-identity-provider: | |
milestone: | none → public-rollout |
tags: |
added: u1-support removed: os-support |
tags: | added: u1-by-support |
tags: | removed: u1-support |
Changed in canonical-identity-provider: | |
status: | Confirmed → Fix Released |
Changed in canonical-identity-provider: | |
status: | Fix Released → Confirmed |
To post a comment you must log in.