Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

User based ip restrictions. #5

Open
Sarabjeet76 opened this issue Jun 27, 2018 · 5 comments
Open

User based ip restrictions. #5

Sarabjeet76 opened this issue Jun 27, 2018 · 5 comments

Comments

@Sarabjeet76
Copy link

Great plugin !
I want to suggest a feature where ip based restrictions can be applied to only one or more user groups instead of restricting all user groups at once.

@turnermm
Copy link
Owner

turnermm commented Jun 27, 2018

Abortlogin is a gate-keper, It prevents outsiders from getting past the gate--i.e., the login form. Users and groups are on the inside of the gate and have no meaning in advance of the user's being logged in. I wrote this plugin because I get literally thousands of attempts to break into my wikis via login. Not only does it prevent attempts to login by brute force means, i.e. trying multiple passwords and users,, it also prevents hackers from circumventing the login screen itself. You can probably do what you want to do by using ACL rules. You can refuse read permission to pages based on user groups--you can devise as many groups as you need.

@Sarabjeet76
Copy link
Author

Sarabjeet76 commented Jun 29, 2018 via email

@turnermm
Copy link
Owner

turnermm commented Jun 29, 2018 via email

@Sarabjeet76
Copy link
Author

There should be a way so that all users are allowed to see the login screen but when a user/ user group signs in, a pop out message should display telling " You are not allowed to login from this ip"

@turnermm
Copy link
Owner

The plugin can't do this because it does its work before DokuWiki has set up the ACL rules that govern logged on users. If you want to do this, use ACL. Create a group that will have access to these pages, go the the Access Control administration panel and give this group permission to read (or edit or create) these pages. Then set the @ALL group to none for these pages. Event if the plugin could do what you want, it would make no sense since it can already be done by the built-in access management system.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants