Protecting local accounts against brute force attacks
Externally managed accounts (SAML or Windows authentication) are already protected against brute force attacks by the mechanisms of each identity provider.
To protect local accounts against brute force attacks, a local account is blocked for fifteen minutes after five failed login attempts by default. Configure the blocking period and maximum number of failed login attempts in the Portal.
Setting the maximum login attempts and blocking period
To set the maximum number of failed login attempts and the blocking period of local accounts:
Log in to the CLI of the Portal appliance.
Optional: If the Portal has no configuration file yet, that is, if portal.conf does not exist in folder /var/nexthink/portal/conf, create it by copying the defaults from the sample configuration file:
sudo -u nxportal cp /var/nexthink/portal/conf/portal.conf.sample \
Edit the Portal configuration file:
sudo vi /var/nexthink/portal/conf/portal.conf
Press G to go to the end of the file.
Press o to insert a new line.
Type in the following line to configure the maximum number of failed login attempts before blocking the local account. For example, to specify the default of 5 times:
globalconfig.portal.user.max-consecutive-failed-logins = 5
Type in the following line to configure the blocking period. For example, to specify the default of 15 minutes:
globalconfig.portal.user.lock-account-duration = 15m
Press Esc to stop editing.
Save your changes and exit by typing:
Restart the Portal to apply your settings:
sudo systemctl restart nxportal
Central administrators can see the blocked local accounts and the time until they are blocked in the Portal, by opening the dashboard Accounts under ADMINSTRATION - ACCOUNT MANAGEMENT.