powerful-addition-52589
08/22/2022, 9:34 AMmagnificent-energy-493
steep-lamp-91158
steep-lamp-91158
powerful-addition-52589
08/22/2022, 11:53 AMLocking them before they change their passwordThat one. Use case would be us detecting an attack that might have impacted that user. Our users might go weeks/month between login and reseting their password to force a flow is not good user experience
powerful-addition-52589
08/22/2022, 11:54 AMpowerful-addition-52589
08/22/2022, 12:02 PMmagnificent-energy-493
detecting an attack that might have impacted that userDo you have something specific in mind already? I think email and password leaks would be good examples, but those wouldn’t be too common (I hope) - we already check against haveibeenpwned upon account creation, you can also run your own instance of it.
powerful-addition-52589
08/22/2022, 2:12 PMupon account creationwe are going to monitor new breaches, maybe via 3rd party services, and would want to be able to lock existing users who we think might have been compromised
steep-lamp-91158
powerful-addition-52589
08/22/2022, 2:13 PMforce a rest
that's the bit we don't like
powerful-addition-52589
08/22/2022, 2:15 PMpowerful-addition-52589
08/22/2022, 2:17 PMmagnificent-energy-493
if I force a reset flow, the user have to act on the email, and if they don’t, force them through a forgotten password flow
Not (in our opinion) user friendly.
We think we prefer locking the potentially compromised acct and force them to reset their password when, and only when they actually intend to access our serviceIn that case do a normal forgotten password flow but delay the email until they actually access the service
powerful-addition-52589
08/22/2022, 2:22 PMdelay the email until they actually access the servicehaaa... ok, I ned to check that
magnificent-energy-493
magnificent-energy-493
steep-lamp-91158
powerful-addition-52589
08/22/2022, 2:27 PM