A terminal-based user authentication system designed to showcase registration, login, and password reset functionality using a CSV-based storage.
- User Authentication: Register, log in, and reset passwords.
- CSV-Based Storage: User data is stored and retrieved from a CSV file.
- Secure: Passwords are hashed before being stored.
- CLI Interface: Clear menu-driven CLI interface to interact with the system.
- Logout Feature: Allow logged-in users to securely log out of the system.
- Password Strength Checker: Enforce users to choose strong passwords during registration or reset.
- Forgot Password Mechanism: Offer a mechanism for users to recover their password if forgotten.
- Delete Account Option: Allow users to delete their account and all associated data.
- Lockout Mechanism: Deter brute-force attempts by locking out after consecutive incorrect password attempts.
- Session Management: A timeout mechanism that logs out the user after a certain period of inactivity.
- Audit Log: Maintain a log of all authentication activities for monitoring and security purposes.
- Multi-Factor Authentication: Introduce an option for users to enable additional security layers for logging in.
- Multi Factor Auth. Add-On: Give users an option to enable/disable MFA during registration/post-login.
- Last Login Information: Display the date and time of the last successful login upon each login.
Contributions are what make the open-source community such an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.
- Fork the Project
- Create your Feature Branch:
git checkout -b feature/AmazingFeature
- Commit your Changes:
git commit -m 'Add some AmazingFeature'
- Push to the Branch:
git push origin feature/AmazingFeature
- Open a Pull Request
- Integration with CAPTCHA: To prevent bots from abusing the registration or login processes, integrate CAPTCHA challenges.
- API Integration: Code refactor & allow integration with other systems - used as a service by other apps. For users who may interact with other softwares, provide API key generation & management within the user account.
- Transition to a Relational Database: Migrate from a CSV-based system to a more robust relational database like PostgreSQL or MySQL for better scalability, performance, and security.
- Database Backup and Recovery: Design a backup mechanism & implement routine backups of the database to safeguard user data and ensure recovery options in case of unexpected system failures.
- Data Validation and Sanitization: Enhance the system to validate and sanitize inputs more thoroughly to protect against SQL injection and other potential threats, especially if moving to a more complex database system.
- OAuth & Social Media Logins: Allow users to log in using their social media accounts or through OAuth providers like Google, Facebook, etc.
- User Profiles: Expand the system to allow users to have profiles where they can update their personal information, profile pictures, etc.
- User Role & Permissions: Introduce user roles (Admin, User, Guest, etc.) and permissions, allowing for different levels of access based on the role assigned to a user.
- Scalability & Concurrency: Design the system for high availability and ensure that it can handle a large number of simultaneous concurrent users.
- Rate Limiting: Introduce rate limiting to prevent abuse from a single IP or user, especially during login or registration processes.
- Geofencing: Allow or disallow authentication based on geographic location.
- Email Integration: Send email notifications for important activities like password reset, account deletion, or suspicious activity alerts. This can also include a verification email upon registration.
- Inactive Account Pruning: Automatically disable or delete accounts that have been inactive for a long period, with prior notification to the user.
- Advanced Security Features: Introduce more advanced security features such as device fingerprinting, and machine learning-driven anomaly detection for suspicious activities.
- Access Review: Periodic prompts for users to review and confirm their security settings, active sessions, and connected devices.
- Logging & Monitoring: Implement a more comprehensive logging and monitoring solution. Integrate with platforms like ELK stack (Elasticsearch, Logstash, and Kibana) or Graylog to monitor and analyze system logs in real-time.
Distributed under the MIT License. See LICENSE
for more information.