Answer the question
In order to leave comments, you need to log in
How to properly track and handle user authorization?
Interested in algorithms for protecting against account hijacking by accounting and checking atypical locations from which an authorization attempt is made.
The approximate procedure is clear. You log the authorization facts, check the location, if you are, for example, in another country, then we ask you to confirm your authenticity (via SMS, etc.)
But maybe someone will share links to sensible manuals and articles on this topic? Googled - didn't find it
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question