[ 
https://issues.apache.org/jira/browse/SYNCOPE-507?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14052222#comment-14052222
 ] 

Francesco Chicchiriccò commented on SYNCOPE-507:
------------------------------------------------

Hi Guido,
ATM if {{log.lastlogindate}} is set to {{false}} (which is *not* the default 
BTW), failed authentication attempts are registered anyway; as a result, users 
still get locked after 3 failed login attempts, but such counter is not reset 
after a successful authentication - see [around line 
155|https://svn.apache.org/viewvc/syncope/branches/1_1_X/core/src/main/java/org/apache/syncope/core/security/SyncopeAuthenticationProvider.java?view=markup&pathrev=1603768].
The whole point here is to avoid writing to the database on the common case, 
e.g. successful authentication.

If you choose to set {{log.lastlogindate}} to {{false}}, a drawback for 
administrators is that they will need to manually unlock users more frequently.

> User login date conditional logging
> -----------------------------------
>
>                 Key: SYNCOPE-507
>                 URL: https://issues.apache.org/jira/browse/SYNCOPE-507
>             Project: Syncope
>          Issue Type: Improvement
>          Components: core
>    Affects Versions: 1.1.7
>            Reporter: Yann Diorcet
>            Assignee: Francesco Chicchiriccò
>            Priority: Minor
>             Fix For: 1.1.8, 1.2.0
>
>         Attachments: 0001-Conditional-authentication-DB-logs.patch
>
>
> When used aside other processes with huge IO usage, the REST call to 
> syncope/cxf/users/self can be take lot of time to reply (on our machine up to 
> 60 seconds). This is due to the DB update on lastLoggindDate, mysql takes lot 
> of time to commit the modifications.
> Maybe add an option for disabling this feature (or restrict the update 
> following a minimum time gap) can be a good idea



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to