Password reset is an essential process to ensure the security and continuous access to user accounts on the T6 platform. This procedure allows users to regain access to their accounts in cases of forgotten or compromised passwords. Password reset confirmation is carried out via an e-mail sent to the address previously registered by the user. This e-mail contains a verification link that must be used to complete the reset, ensuring that only the owner of the e-mail address has the capability to change the password. This authentication method is adopted due to its effectiveness in preventing unauthorized access and protecting users personal information.
The password reset system is designed to provide a secure and efficient experience for users who need to regain access to their accounts. The system includes the option to initiate the reset directly from the login interface, where the user can request a confirmation e-mail by entering their username or registered e-mail address. The confirmation e-mail contains clear instructions and a temporary link (valid for 5 minutes) that must be used to create a new password.
The use of password reset is essential to maintain the security and accessibility of user accounts. It allows users to recover access to their accounts in case of forgotten passwords or suspected compromise.
We have a level of granularity that makes the password reset configuration applied hierarchically, with the priority being USER → GROUP → SYSTEM.
- The application will first respect the parameters applied at the User level, then at the Group level, and finally at the System level. Therefore, if the password reset is applied through the system parameter, and it is not enabled for the group or user, the reset will not be applied, as group and user settings take priority;
- The same applies in the opposite scenario. If the password reset option is enabled at the user level but not at the group or system level, the user will continue to have the password reset active.
To use the Password Reset, we need to ensure that the system's e-mail parameters are configured correctly; otherwise, the user will not be able to receive the reset e-mails.
smtp.office365.com
), but the client can choose their preferred server;Open the system menu and, under Access Control, select Users;
Select the user to whom the parameters will be applied and click on: , a side panel will open;
All fields with * are mandatory. Pay close attention to the e-mail field, as this is the address to which the reset link will be sent;
There are switch buttons that can be enabled or disabled;
Click SAVE to close the panel and proceed.
The Password History Check parameter will verify the user's previously used passwords, preventing a password that has been used before from being reused. Through this parameter, we can define how many previous passwords the system will check.
To configure it, follow these steps:
To use the password reset:
If the user is Blocked or Inactive, attempting to use the password reset feature will send an e-mail informing the user of their status and requesting them to contact the system administrator!
In T6 Enterprise, we previously used the SHA-1 encryption algorithm for generating user passwords. However, due to identified vulnerabilities in SHA-1, we decided to migrate to the SHA-256 algorithm. This update represents a significant improvement in security, as SHA-256 offers much greater resistance to collision and brute-force attacks.
SHA-256 offers various features and improvements compared to SHA-1. While SHA-1 generates a 160 bit hash, SHA-256 generates a 256 bit hash, providing an extra layer of security and significantly complicating attacks. SHA-256 is highly resistant to collision attacks, where two different inputs can produce the same hash, and brute-force attacks, where the original input can be guessed, due to its longer hash. This considerably enhances data security.
Additionally, SHA-256 is considered secure and robust, with no known vulnerabilities to date, ensuring data integrity and confidentiality, in contrast to SHA-1, which is vulnerable to modern attacks that exploit its weaknesses. It is ideal for T6 Enterprise, which requires a high level of security, such as password protection, user authentication, and ensuring the integrity of sensitive data. These features make SHA-256 a crucial upgrade over SHA-1, ensuring superior security and greater resistance against modern threats, reflecting our ongoing commitment to protecting user data.
Whenever a user is created or changes their password, the encryption used will be SHA-256. Even if the user changes the password and reverts to a previously used password, the generated hash will never be the same, altering the code with each change.