From: | Khushboo Vashi <khushboo(dot)vashi(at)enterprisedb(dot)com> |
---|---|
To: | pgadmin-hackers <pgadmin-hackers(at)postgresql(dot)org> |
Subject: | Re: [pgAdmin4][Patch] - Fix for RM #6664 |
Date: | 2021-08-09 07:39:44 |
Message-ID: | CAFOhELeUUTeUqjvZ4LuNqwYyL9tW8GKmFa_kNF53pnmA4gJppQ@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgadmin-hackers |
Hi,
Kerberos Login fails for the first time which is a regression of the #6337
- Login page brute force.
Please find the attached updated patch with this fix.
Thanks,
Khushboo
On Mon, Aug 9, 2021 at 11:32 AM Khushboo Vashi <
khushboo(dot)vashi(at)enterprisedb(dot)com> wrote:
> Hi,
>
> Please find the attached fix for the RM #6664. The issue is, even if the
> user is locked, he can reset the password and can login into pgAdmin.
>
> With this fix, I have also ensured that the account should be locked with
> the multiple failed attempts only for the Internal pgAdmin users.
>
> Thanks,
> Khushboo
>
Attachment | Content-Type | Size |
---|---|---|
RM_6664_v1.patch | application/octet-stream | 2.3 KB |
From | Date | Subject | |
---|---|---|---|
Next Message | Akshay Joshi | 2021-08-09 09:15:26 | pgAdmin 4 commit: Added support to copy SQL from main window to query t |
Previous Message | Khushboo Vashi | 2021-08-09 06:02:20 | [pgAdmin4][Patch] - Fix for RM #6664 |