generated from hackforla/.github-hackforla-base-repo-template
-
-
Notifications
You must be signed in to change notification settings - Fork 42
Security
Bonnie Wolfe edited this page Aug 1, 2025
·
8 revisions
- Security admin access user can access this tab.
- Security user will be able to grant or revoke admin and security admin access from all the list of users.
- User can also archive particular listed user.
- Dev URL: https://tdm-dev.azurewebsites.net/roles
- Prod URL: https://tdm.ladot.lacity.org/roles
- GitHub location:
- Figma Design:
- WIKI TDM Calculator Figma Pages and Structure
- Figma [TDM Calculator Figma Pages and Structure, User-Facing Screens]
- Figma [TDM Calculator Handoff, User-Facing Screens]
- Issue Label on Issue tab: p-feature: Security Admin page
- Issue label on Project Board: p-feature: Security Admin page
-
GET /api/accounts(requiresisSecurityAdminrole) -
PUT /:id/unarchiveaccount(requiresisSecurityAdminrole) -
GET /archivedaccounts(requiresisSecurityAdminrole) -
DELETE /:id/deleteaccount(requiresisSecurityAdminrole) -
PUT /:id/roles(requiresisSecurityAdminrole) -
PUT /updateaccount(requires user authentication) -
POST /login(requires user authentication) -
GET /logout(requires user authentication)
-
isSecurityAdminrole:GET /api/accountsPUT /:id/unarchiveaccountGET /archivedaccountsDELETE /:id/deleteaccountPUT /:id/roles
-
isAdminrole:- None explicitly mentioned in the provided code snippets
-
POST /register(may be vulnerable to brute-force attacks or email enumeration attacks) -
POST /forgotPassword(may be vulnerable to brute-force attacks or email enumeration attacks) -
POST /resetPassword(may be vulnerable to brute-force attacks or password enumeration attacks)
- The use of JWT tokens for authentication and authorization is a good practice, but it's essential to ensure that the tokens are properly validated and verified on each request.
- The
jwtSession.validateRolesmiddleware function is used to validate roles, but its implementation is not provided in the code snippets. It's crucial to ensure that this function is correctly implemented to prevent unauthorized access. - The
poolConnectfunction is used to connect to a database, but its implementation is not provided in the code snippets. It's essential to ensure that this function is correctly implemented to prevent SQL injection attacks.
Please note that this analysis is based on the provided code snippets and may not be comprehensive. A more thorough review of the codebase would be necessary to provide a complete security assessment.
After you have read the info for all joining team members, read the pages for your practice area