I think you're on the right track with the suggestion to create our own Authentication class. I'm not well versed in Shiro yet but it would be a custom version of one (or more) of the related classes. I'm not terribly concerned about implementing these features myself as needed, I just didn't want to reinvent the wheel if there were similar capabilities provided within Shiro.
Thanks! -- View this message in context: http://shiro-user.582556.n2.nabble.com/Does-Shiro-provide-suspicious-activity-detection-threat-detection-tp7580510p7580519.html Sent from the Shiro User mailing list archive at Nabble.com.
