Gem ActiveAdmin是否可以防止BruteForce登录,

时间:2015-07-24 03:40:15

标签: ruby-on-rails activeadmin

我查看了为AdminUser生成的默认配置和架构,

create_table "admin_users", force: :cascade do |t|
    t.string   "email",                  default: "", null: false
    t.string   "encrypted_password",     default: "", null: false
    t.string   "reset_password_token"
    t.datetime "reset_password_sent_at"
    t.datetime "remember_created_at"
    t.integer  "sign_in_count",          default: 0,  null: false
    t.datetime "current_sign_in_at"
    t.datetime "last_sign_in_at"
    t.string   "current_sign_in_ip"
    t.string   "last_sign_in_ip"
    t.datetime "created_at",                          null: false
    t.datetime "updated_at",                          null: false
  end

似乎没有任何东西阻止任何知道电子邮件的黑客最终进入系统。有什么方法可以使用Devise或者一些教程来保护自己吗?

由于

1 个答案:

答案 0 :(得分:0)

您可以将Devise与ActiveAdmin一起使用,方法是将devise gem添加到您的gemfile并更改您的路由,如下所示:

devise_for :users, ActiveAdmin::Devise.config
ActiveAdmin.routes(self)

然后您可以配置设备以在X尝试

后锁定用户

型号:

class Example < ActiveRecord::Base
  devise :lockable # ...

设计配置:

config.lock_strategy = :failed_attempts
config.unlock_keys = [ :email ]
config.unlock_strategy = :email
config.maximum_attempts = 20