Users can use password authentication as one of the authentication methods to access Aptible resources via the Dashboard and CLI.

Requirements

Passwords must:

  1. be at least 10 characters, and no more than 72 characters.
  2. contain at least one uppercase letter (A-Z).
  3. contain at least one lowercase letter (a-z).
  4. include at least one digit or special character (^0-9!@#$%^&*()).

Aptible uses Have I Been Pwned to implement a denylist of known compromised passwords.

Account Lockout Policies

Aptible locks out users if there are:

  1. 10 failed attempts in 1 minute
  2. 20 failed attempts in 1 hour
  3. 40 failed attempts in 1 day.

Aptible monitors for repeat unsuccessful login attempts and notifies customers of any such repeat attempts that may signal an account takeover attempt. For granular control over login data, such as reviewing every login from your team members, set up SSO using a SAML provider, and require SSO for accessing Aptible.

2-Factor Authentication (2FA)

Regardless of SSO usage or requirements, Aptible strongly recommends using 2FA to protect your Aptible account and all other sensitive internet accounts.

Enrollment

Users can enable 2FA Authentication in the Dashboard by navigating to Settings > Security Settings > Configure 2FA.

Supported Protocols

Aptible supports:

  1. software second factors via the TOTP protocol. We recommend using Google Authenticator as your TOTP client
  2. hardware second factors via the FIDO protocol.

Scope

When enabled, 2FA protects access to your Aptible account via the Dashboard, CLI, and API. 2FA does not restrict Git pushes - these are still authenticated with SSH Public Keys. Sometimes, you may not push code with your user credentials, for example, if you deploy with a CI service such as Travis or Circle that performs all deploys via a robot user. If so, we encourage you to remove SSH keys from your Aptible user account.

Aptible 2FA protects logins, not individual requests. Making authenticated requests to the Aptible API is a two-step process:

  1. generate an access token using your credentials
  2. use that access token to make requests

2FA protects the first step. Once you have an access token, you can make as many requests as you want to the API until that token expires or is revoked.

Recovering Account Access

Account owners can reset 2FA for all other users, including other account owners, but cannot reset their own 2FA.

Auditing

Organization administrators can audit 2FA enrollment via the Dashboard by navigating to Settings > Members.

Was this page helpful?