Brute force attack login prevention in Service Desk
search cancel

Brute force attack login prevention in Service Desk

book

Article ID: 272339

calendar_today

Updated On:

Products

CA Service Management - Service Desk Manager

Issue/Introduction

The vulnerability scan test detected that should there be a brute force attack, the Service Desk Manager does not lock out the user(s): It was identified that N login requests can be made, which allows trying as many times as the password of a user is necessary to enter. We need to know if there is any brute force blocking for the SDM application, such as limited login attempts with users or IP blocking.  Is there a way to eliminate this vulnerability?

Environment

Release : 17.3 +

Cause

A security expert ran a vulnerability scan test and found that the user was never getting locked out. 

Resolution

Under normal operation, when the users reach the SDM application, the authentication should have already been performed either through Integrated EEM or by using external authentication services (AD) integrated with EEM, and the authenticated user ID is mapped to the SDM contact that is configured with Access Type. Using an Active Directory, you can apply password policies e.g. changing it sporadically. If robust authentication and authorization is a requirement, you can adopt Single Sign-On, SAML, SSL, etc. Please review the External Authentication section of the linked techdocs(see additional information section).

Additional Information

https://techdocs.broadcom.com/us/en/ca-enterprise-software/business-management/ca-service-management/17-3/administering/configure-ca-service-desk-manager/ca-sdm-user-authentication.html#concept.dita_1448cfe8397926218c82c298a326da8533804e4a_LoggedInUserCountsandSessionCounts