R
R
reasoni2015-01-30 08:03:34
User identification
reasoni, 2015-01-30 08:03:34

How to properly track and handle user authorization?

Interested in algorithms for protecting against account hijacking by accounting and checking atypical locations from which an authorization attempt is made.
The approximate procedure is clear. You log the authorization facts, check the location, if you are, for example, in another country, then we ask you to confirm your authenticity (via SMS, etc.)
But maybe someone will share links to sensible manuals and articles on this topic? Googled - didn't find it

Answer the question

In order to leave comments, you need to log in

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question