LG-767 Alert a user on personal key sign in#2630
Conversation
**Why**: So that users will know when their personal key is being used to sign in and be aware of any suspicious activity around their personal key.
|
Where do the links at the bottom go to? ( I would make this a little friendlier, so that in the common case it's not alarming, while making it clear in the uncommon case that it needs to be given attention. It should probably also indicate to the user that this changed their personal key and the user should have saved a new one -- so that if the user does not have a new one, they know to perk up. For example:
One thing we'll talk about later this afternoon - the viability of including a SP-specific contact link/email at the bottom to get both us and our SP pinged. Another thing I'll put into Slack or JIRA - a link to partially lock the account and do some other stuff to make it easier to respond during an active account takeover. |
|
Here's where the links go: They can be changed if we know what we want them changed to; I lifted them from the password changed email. SP specific links in email will be a little bit trickier and will require some additional considerations. I'd suggest a different ticket and PR for that change. Same for a link to partially lock the account. |
|
@jgsmith-usds Here is the updated text for the email and SMS notification. Take a look and let me know if you have you any questions. @konklone it might be good to get your input on this as well. |
**Why**: So that users will know when their personal key is being used to sign in and be aware of any suspicious activity around their personal key.


Why: So that users will know when their personal key is being used
to sign in and be aware of any suspicious activity around their personal
key.
Controllers
authenticated, make sure to add
before_action :confirm_two_factor_authenticatedas the first callback.
Database
Unsafe migrations are implemented over several PRs and over several
deploys to avoid production errors. The strong_migrations gem
will warn you about unsafe migrations and has great step-by-step instructions
for various scenarios.
Indexes were added if necessary. This article provides a good overview
of indexes in Rails.
Verified that the changes don't affect other apps (such as the dashboard)
When relevant, a rake task is created to populate the necessary DB columns
in the various environments right before deploying, taking into account the users
who might not have interacted with this column yet (such as users who have not
set a password yet)
Migrations against existing tables have been tested against a copy of the
production database. See LG-228 Make migrations safer and more resilient #2127 for an example when a migration caused deployment
issues. In that case, all the migration did was add a new column and an index to
the Users table, which might seem innocuous.
Encryption
Routes
state or result in destructive behavior).
Session
user_sessionhelperinstead of the
sessionhelper so the data does not persist beyond the user'ssession.
Testing
and invalid inputs.