What type of suspicious activity detection are you looking for? Something like max login attempts? http://shiro-user.582556.n2.nabble.com/ExcessiveAttemptsException-How-to-configure-td4534742.html
DOS attacks? Depending on what you are looking for it also might be appropriate to monitor this from the outside of your JVM (e. g. at a load balancer) On Mon, Apr 20, 2015 at 1:33 PM, voltron <[email protected]> wrote: > I'm reviewing the feature set of Shiro and OpenAM right now. I know OpenAM > has a suspicious activity detection feature but I'm having trouble figuring > out if Shiro provides a similar feature. > > Aside from that, it looks like most of the high-level features are the > same, > with differentiators being in how things are done. If there are any other > important differentiators anyone is aware of that information would also be > appreciated, but if you only have an answer for my initial question that's > perfectly fine. > > Thanks in advance. > > > > -- > View this message in context: > http://shiro-user.582556.n2.nabble.com/Does-Shiro-provide-suspicious-activity-detection-threat-detection-tp7580510.html > Sent from the Shiro User mailing list archive at Nabble.com. >
