AnswerBun.com

Case sensitive logins

Information Security Asked by bobif on February 12, 2021

Why does owasp recommend using case insensitive logins ?

Make sure your usernames/user IDs are case-insensitive. User ‘smith’
and user ‘Smith’ should be the same user.

What’s the security aspect of it?

2 Answers

I can see two main aspects:

  1. Convenience

    Users with mobile keyboards with auto-capitalization enabled will not have to change the first letter to lower case before submitting the form, and that leads to a better user experience.

  2. Makes impersonation harder

    If Smith and smith are seem as different users, and you allow users to communicate with each other, someone can create "clones" of the current accounts and mislead other users.

Correct answer by ThoriumBR on February 12, 2021

Many users use Windows and in Windows, the most names are not case sensitive. So if you want a nice user experience you should avoid case sensitive names.

But Unix systems have used case sensitive names for 50 years with no problem at all, because their users had to know that smith, Smith and SMITH are 3 different names, either for files or for users.

If the names are given by an administrator, it does not matter whether they are or not case sensitive: no sane administrator would give smith to John Smith and Smith to Bob Evil. But when you have a system in which users can register automatically, it can be important to prevent Bob Evil to create a Smith account. If you don't, you would fail your professional duty of good practices and help Bob to impersonate John.

Answered by Serge Ballesta on February 12, 2021

Add your own answers!

Related Questions

What’s a “safe” URL shortening algorithm?

3  Asked on December 31, 2020 by bensower

   

Securing internet connection with hostile ISP

1  Asked on December 29, 2020 by user242761

       

Is Chrome Browser/ Computer compromised by KMSPico?

0  Asked on December 27, 2020 by waterbyte

         

Web Cache Deception – exploitable without a cache server?

1  Asked on December 26, 2020 by citylight

 

Determine if private key belongs to certificate?

3  Asked on December 25, 2020 by thanatos

     

Filtering http responses for subdomain takeover

0  Asked on December 21, 2020 by kirill-z

 

Sql map Manual Vulnerability Assessment

1  Asked on December 20, 2020 by badddy

         

Unknown folders in OneDrive

1  Asked on December 19, 2020 by user851

     

Ask a Question

Get help from others!

© 2023 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP