What type of suspicious activity detection are you looking for?

Something like max login attempts?
http://shiro-user.582556.n2.nabble.com/ExcessiveAttemptsException-How-to-configure-td4534742.html

DOS attacks?

Depending on what you are looking for it also might be appropriate to
monitor this from the outside of your JVM (e. g. at a load balancer)

On Mon, Apr 20, 2015 at 1:33 PM, voltron <[email protected]> wrote:

> I'm reviewing the feature set of Shiro and OpenAM right now. I know OpenAM
> has a suspicious activity detection feature but I'm having trouble figuring
> out if Shiro provides a similar feature.
>
> Aside from that, it looks like most of the high-level features are the
> same,
> with differentiators being in how things are done. If there are any other
> important differentiators anyone is aware of that information would also be
> appreciated, but if you only have an answer for my initial question that's
> perfectly fine.
>
> Thanks in advance.
>
>
>
> --
> View this message in context:
> http://shiro-user.582556.n2.nabble.com/Does-Shiro-provide-suspicious-activity-detection-threat-detection-tp7580510.html
> Sent from the Shiro User mailing list archive at Nabble.com.
>

Reply via email to