Provide One-Time-Password authentication with a Yubikey hardware token. ![]() Yubikey Hardware Authentication - (15008 downloads) From the log file I would guess that postfix correctly delivers it to a maildir in some specific path but dovecot is configured to a different maildir and therefor never sees the new mail. For ubuntu 14.04 it probably is in /var/log/mail.log. To logg in with your email address as in virtusertable To access your account information please enter your username (this is typically your email address) and password below. Check what happens when you send the mail in the postfix log. User Restriction by IP - (7472 downloads)Īllow the restriction of users based on source IP The swekey is an USB authentication key that lets you secure access to your webmail. Swekey Hardware Authentication - (4748 downloads) Restricts valid usernames via database entriesĪllows the user to change the mail folder that is displayed when first logging in. Manges restricted usernames via Web Interface Prevents browsers from remembering input to the username and password fields in order to prevent malicious persons recalling previous login credentials on public terminals.Īllows users to restrict their login session to a single IP address.Įnsures SSL security is enabled during login (at least) When users click the Sign Out button they will be logged out and then sent to signoutpage. Saves the username and/or password in an encrypted persistent cookie, allowing the user to log in much faster.Īllows manual selection of login server on login page.Īllows users to create a list of usernames and/or passwords that will work one time only so that if stolen during login, would pose no security risk. ![]() Helps manage and manipulate usernames given at login time, and allows the use of different SquirrelMail settings (such as login page image, or IMAP server) for each domain, each user, or each user group.įorce the use of a custom login screen instead of default SquirrelMail login page. Prevents cross-contamination of user preferences when users log in to SquirrelMail using a browser where another user was already logged in to the same server/domain. Specify a list of users or domains that should be disallowed login access and/or stop brute-force password guessing attacks.Īllows users to specify a optional personalized login alias.Īllows externally authenticated (using HTTP authentication or a single sign-on system) users to skip the SquirrelMail login page. Places a CAPTCHA input on the login screen to prevent automated login attacks. All kinds of ways to change or extend the login procedure.
0 Comments
Leave a Reply. |