Skip to content

Commit daad7a6

Browse files
authored
Merge pull request #5720 from AnuradhaSK/recovery-portal-best-practice
Fix indentation issue
2 parents 8a9cc3e + 33c25f2 commit daad7a6

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

en/identity-server/6.1.0/docs/apis/recovery-portal-best-practices.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,38 +4,38 @@ This guide outlines recommended best practices for designing and deploying such
44

55
1. Add reCAPTCHA to the flow initiation step
66

7-
- Before sending an OTP or recovery code, require reCAPTCHA verification to block bots and brute-force attempts.
8-
- Apply reCAPTCHA to:
9-
- Forgot Password initiation
10-
- Resend recovery code endpoints
11-
- reCAPTCHA protects against automated SMS/email flooding and username enumeration.
7+
- Before sending an OTP or recovery code, require reCAPTCHA verification to block bots and brute-force attempts.
8+
- Apply reCAPTCHA to:
9+
- Forgot Password initiation
10+
- Resend recovery code endpoints
11+
- reCAPTCHA protects against automated SMS/email flooding and username enumeration.
1212

1313
2. Prevent username enumeration
1414

15-
- Ensure API responses didn't reveal whether an account exists.
16-
- Use a generic message such as: "If the provided username is valid, an OTP will be sent to the registered email address or phone number."
17-
- Return the same response for valid and invalid usernames to avoid revealing account existence.
15+
- Ensure API responses didn't reveal whether an account exists.
16+
- Use a generic message such as: "If the provided username is valid, an OTP will be sent to the registered email address or phone number."
17+
- Return the same response for valid and invalid usernames to avoid revealing account existence.
1818

1919
3. Enforce a short OTP or recovery link lifespan
2020

21-
- Set a short validity period for OTP or recovery link (recommended: 1 minute) to reduce risk from interception.
22-
- A short expiration window significantly reduces exposure.
21+
- Set a short validity period for OTP or recovery link (recommended: 1 minute) to reduce risk from interception.
22+
- A short expiration window significantly reduces exposure.
2323

2424
4. Increase OTP complexity
2525

26-
- Use stronger OTP to resist brute-force and guessing attacks:
27-
- Use 6–8 digit numeric OTP or alphanumeric OTP.
28-
- Stronger OTPs increase the difficulty of automated attacks.
26+
- Use stronger OTP to resist brute-force and guessing attacks:
27+
- Use 6–8 digit numeric OTP or alphanumeric OTP.
28+
- Stronger OTPs increase the difficulty of automated attacks.
2929

3030
5. Implement rate limiting for OTP submission
3131

32-
- Rate limit OTP verification endpoints by IP address.
33-
- Consider progressive delays or temporary lockouts after repeated failures.
32+
- Rate limit OTP verification endpoints by IP address.
33+
- Consider progressive delays or temporary lockouts after repeated failures.
3434

3535
6. Notify users of password recovery attempts
3636

37-
- Notify users when a password recovery flow completes successfully.
38-
- Include in the notification:
39-
- A warning if the user didn't initiate the request
40-
- Recommended steps to secure their account
41-
- Notifications help users detect unauthorized activity early.
37+
- Notify users when a password recovery flow completes successfully.
38+
- Include in the notification:
39+
- A warning if the user didn't initiate the request
40+
- Recommended steps to secure their account
41+
- Notifications help users detect unauthorized activity early.

0 commit comments

Comments
 (0)