Sha256: a9927f247771a94232d5915b2f147c5d07b8fa7cba7ecaaa4ef3b3bdc0763bcd
Contents?: true
Size: 792 Bytes
Versions: 20
Compression:
Stored size: 792 Bytes
Contents
Feature: Delay After Failed Login As an administrator I want to make brute force attacks less efficient So that an attacker doesn't gain access Scenario: Failed login attempts Given the test server has a failed login delay of 0.2 seconds And the test server is started Given the client connects And the client logs in with bad user And the client logs in with bad user And the client logs in Then it should take at least 0.4 seconds Scenario: Failed login attempts Given the test server has a failed login delay of 0.0 seconds And the test server is started Given the client connects And the client logs in with bad user And the client logs in with bad user And the client logs in Then it should take less than 0.4 seconds
Version data entries
20 entries across 20 versions & 2 rubygems