Tommy Pham wrote:

> 1) Set an encrypted (to prevent hijacking and eavesdropping) cookie to
> expire when browser closes
> 2) Have a table in the DB backend to keep track if the user is logged in or
> not and when was the last time the validated user access your site (this
> gets updated when the user visit a link on your site by checking the cookie
> and the DB entry of the session ID)
> 3) Set your session timeout accordingly to you security requirement
> 4) Have a javascript on a timeout to self-logoff should the user is AFK
> longer than your session timeout.
> 
> If another user or if the same user tries to login with a different browser,
> you can check the status of the user.  If the user is logged in, you can
> deny it after the authentication.  Should the user closes the browser
> without having to logoff, you can check when was the last time the user
> accessed your site and see if it's been longer than your session timeout.
> For security purposes, you can optionally send a courtesy email notifying
> that the user didn't logout properly since last accessed.  This way, you can
> track whether if the user's system is compromised in some way or not.  It
> all depends on what kind of application, service, user level access, and the
> strict security you require.

Thanks Tommy.  That was very helpful, and some of it is similar to how I
was thinking of doing it.

James

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to