Jump to content

Customer Portal - Password Policies


Martyn Houghton

Recommended Posts

Hi @Steven Cotterell

Its something we have in our backlog but we are really busy at the moment and have not got too much free capacity.  The issue is not so much with the timing out of the passwords themselves, thats relatively trivial, it's the behaviour of the system both before and after a timeout event. What is your expectation, are you simply looking to lock out an account after 'n' amount of inactivity, for example if not logged in for 60 days, reset password, or are you looking for the enterprise-style - your password is going to expire notices, your password has expired, please reset, please change your password before continuing etc...  There is quite a stark difference between those two ends of the spectrum

Gerry

Link to comment
Share on other sites

@Gerry,

I agree with @Martyn Houghton here.

A password should have a configurable life duration. As this expiry date approaches a notification should be sent and/or if you login you should get an on-screen notification. After the expiry date you should be forced to change your password.  There should also be some settings that block people using the same password again to go alongside the other Password Policy settings.

Thanks for the response Gerry.

  • Thanks 1
Link to comment
Share on other sites

  • 7 months later...
  • 2 weeks later...

@Martyn Houghton

We looked at this at the same time as looking at the Employee portal. Unfortunately, the Customer Portal for guest accounts has a slightly odd implementation inasmuch as while every contact has a "login ID" field, if that field is empty it will also use email_1, email_2 and email_3 in that order to match against for user authentication.  Sadly, what we have found across our customer estate is email addresses are not unique in some cases, so there is no way to reliably implement the same level of functionality in relation to password expiry and resets because we have no solid point of reference for ID uniqueness. 

Our internal technical proposal is to change the way logins and password resets etc identify a contact, to ONLY work with the login_id property of the contact record and ignore the email fields, this would solve the issue as the login ID field in the database has a unique constraint so we can make assumptions about the uniqueness of the userID login credentials,  and this would allow us to move forwards while at the same time making the overall system more secure.  If we changed that logic now, the odds are good that some customers contacts will not be able to log in to the customer portal because their contact record would not have the login_id value set to their login ID.  

To address this we would need to spend quite a lot of engineering days writing code to detect all of these customer data issues and report them back to each customer so each customer can correct their data issues, and get them fixed before we roll out such a change.  Unfortunately the effort required just to do that is substantial, so the whole thing has been kicked down on the priority list at this time. 

 

Gerry

 

 

 

 

 

Link to comment
Share on other sites

@Gerry

Perhaps the way forward would be to provide a second authentication method using the the Hornbill internal contact database as the source but presented as a SAML interface back to it self as an SSO provider. This would also solve the issue where instances want to use mixed environment for authentication. Then only apply the new password controls on the SAML interface. 

This allows existing customer to remain as it, but allow those of us who want to move to a more secure authentication approach a way to move forward without having to ditch the contact database for a external system. This puts the emphasis on those who want to move forward to clean up and maintain their contact data rather than having to be done for everyone by Hornbill.

 

Cheers

Martyn

Link to comment
Share on other sites

Hi Martyn,

One of the plans we have is to separate out the identity and authorization schemes in the exact way you are describing, its well justified but quite a big change.  As part of the process of looking at our next generation UI we are looking at the SAML implementation, and as part of that we will probably be experimenting with a stand-alone IDP.

However, most customers that use the customer portal have this multi-login-id problem, so one thing you can do is to ensure that every contact that uses the customer portal has a valid login Id set, we are soon going to provide a switch that will allow you to enable only using this field. Once all customers who use the customer portal have switched this option on, that will be our trigger where we can make the changes we need to make. 

Thanks for the other email, I will respond this afternoon. 

Thanks. 

Gerry

  • Thanks 1
Link to comment
Share on other sites

  • 1 year later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...