The below described solution will provide "full" flexibility and sufficient security for most situations.

**Benefits:**

- easing the contributions of external groups (contribution/team strategy)
- get around the limitations of not having SSL logins, yet want to prevent passwords being sent across unsecured Wi-Fi networks and the like
- prevent/limit account hijacking possibilities

It will for example fit well in with communities that want to share account at drupal.org too (if implemented at drupal.org, that is).

An administrator of a group that shares an account can make sure no-one can hijack that account while given the opportunity to share it, and also can kick out specific users by changing the pw and removing OpenIDs. This will work if none of the other participants have access to the email accounts registerd (only the admin has).

**Notice: the various elements fit together as a whole and do not necessarily make sense on their own.**

- enable people to share an account (useful for external groups to make and manage/follow-up community contributions. The account tracker becomes a great resource and immensely useful not only for the people involved, and it solves concerns with people joining and leaving teams.
- require email confirmation during password resets
- add more emails to one account
- require confirmation email to at least one (choose/dropdown) of the already registered email addresses in order to change password
- set new password to server-computed pw, NOT displayed on a HTTP connection, optionally emailed to one of the registered addresses.
- couple with OpenID in a similar way: enforce email confirmation before adding or changing OpenIDs
- enforce password resets to random password on the server: Server generates and stores a new random-character strong password WITHOUT showing it (!), ONLY when a link has been used: requiring that link to be sent to one of the registered email addresses. That way the pw can be reset to something no-one knows or is informed about, thus enforcing logging in with their OpenID instead, and no-one can subsequently reset the pw without having access to the registered email accounts. Optional sending of the generated password to one of the email addresses (drop-down that lets user select at the moment of making the change, not forcing to use a default address).
- related option: ability to blog locally, shared directly to that shared drupal account on another site?

**Related:** The way the current password reset works is good:
When a password reset is ordered, Drupal does NOT reset the password, it leaves it untouched but sends a time-limited one-time login link that can be used to change the password. If not used within the valid time, the password will in fact not be changed (desireable behaviour). The password itself is never revealed. This is desired behaviour and will support the above suggested solution for shared accounts.

It is important to be able to register several emails per account, especially if the above is implemented and several OpenIDs are in use, then we need to provide other emails that can optionally be used if there is a problem with one particular email account or mail server or domain name, so that a reset is possible through one functional email address accessible only by the group admin(s).

This also lets us get around the limitations of not having HTTPS on login and user account edit pages on a website such as here at drupal.org.

Comments

hunmonk’s picture

Status: Active » Postponed (maintainer needs more info)

can you explain why you've filed this issue with logintoboggan? this seems way out of scope for the module...

Fuzbolero’s picture

Status: Postponed (maintainer needs more info) » Active

Related feature request for Drupal core:
"User account hijack prevention"
http://drupal.org/node/430780

PS. I realize that a couple of the sentences originally posted in this issue is redundant/misformulated (two are about the same thing), so their description is somewhat rewritten/joined in the mentioned core feature request.)

- add more emails to one account (currently in contributed module, should be supported by core)
- option to have the server generate and store a new (strong) password, NOT displaying it on-screen if not on a httpS (SSL) connection.
- require email confirmation during password resets. (drop-down that lets user select one of the registered email addresses at the moment of making the change, not forcing to use a default address).
- couple with OpenID in a similar way: enforce email confirmation before adding or changing OpenIDs

hunmonk’s picture

Status: Active » Postponed (maintainer needs more info)

require email confirmation during password resets.

http://drupal.org/node/85494

Fuzbolero’s picture

Status: Postponed (maintainer needs more info) » Active

Is there a more suitable contributed module to file this against?

I think the solution to require email is not difficult to implement, and it would let us have this perhas a year or two earlier than if we are to wait for core to be updated. Logintoboggan could also provide this for D5, which a core update probably will not do.

I included a thorough description although not all the items on that list is relevant to implement in this module. But it helps see how they together can solve more than one situation. Please review in the light of only doing parts of this in this module. Also, would be nice to see more reactions, so please dont mark as postponed too quickly, as it might kill an interesting discussion.

hunmonk’s picture

i have no interest in implementing this. if a patch magically appears, i'll certainly review it, but no guarantees that it will get committed.

i think i'd be more interested in abstracting any parts of LT that would be needed into an API, so you can write your own module to accomplish these goals.

hunmonk’s picture

please see http://drupal.org/project/logintoboggan#commitment for more information on how task/feature requests are handled in the module

stevecowie’s picture

Status: Active » Closed (won't fix)

Agreed with hunmonk this is out of scope.

Fuzbolero’s picture