Secure sessions
Cookie hijacking is not the only danger to sessions. Consider the following non-exhaustive list of scenarios that can result in a compromised account:
-
End users entering their data in a malicious website thinking it is the authentic one.
-
End users leaving their computers unattended while their session is open.
-
End users logging in from completely different locations or devices than usual.
The following table summarizes the tasks you should perform to keep sessions secure:
Task | Resources |
---|---|
Settings related to session termination Understand session termination, and configure the session time-to-live and idle timeout. Ensuring sessions expire within a reasonable time helps you protect your environment against impersonation attacks. |
|
Lock accounts after failed login attempts Configure account lockout to protect your environment against brute-force or dictionary attacks. |
|
Limit the number of active user sessions Prevent users from logging in from more than two devices as a time, for example. This helps you mitigate against cases where user accounts have been compromised. |
|
Protect client-side sessions AM offers additional security measures to protect client-side sessions. They are more vulnerable to hijacking than server-side sessions because they contain all the session information in them. |
|
Protect authentication sessions Configure authentication session allowlisting to protect these sessions against replay attacks. |
|
Delete sessions when users change their passwords When a user changes their password, existing sessions are not deleted automatically. You should implement a mechanism to invalidate existing sessions on password reset. |