Overview
The Security & Blocking section provides tools for managing platform security by blocking malicious users and IP addresses, monitoring security events, and protecting the platform from abuse.Accessing Security Management
Navigate to/admin/security to access security controls:
Admin Authorization
Admin Levels
EventPalour has four administrative levels with different permissions:Permission Schema
Platform Admin Table
Permission Checking
Checking Admin Status
Getting Admin Details
Requiring Admin Access
Checking Specific Permissions
Requiring Permissions
Admin Level Hierarchy
Admins are organized in a permission hierarchy:Hierarchy Levels
- Super Admin (level 4) - Full platform access
- Finance (level 3) - Revenue and financial management
- Support (level 2) - User support and basic moderation
- Moderator (level 1) - Content moderation only
Super Admin Authentication
Super admins are controlled via environment variables:Email Whitelist
- Maximum 3 super admin emails
- Case-insensitive email matching
- Comma-separated list in environment variable
Email Verification
Route Access Secret
Optional additional security layer:Blocking Users
The security management interface allows blocking malicious users:Blocked Users Display
- Access their accounts
- Create events or tickets
- Make purchases
- Interact with the platform
Blocking IP Addresses
IP blocking prevents access from specific addresses:IPv6 Support
The system supports both IPv4 and IPv6:IP Tracking
All admin actions log IP addresses for security monitoring:Security Event Monitoring
The admin dashboard shows recent security events:- Action performed
- Admin email
- IP address
- Timestamp
- Success/failure status
Security Best Practices
1. Access Control
- Limit super admin emails to 3 maximum
- Use strong, unique passwords
- Enable route secrets for additional protection
- Regularly review admin access logs
2. IP Blocking Strategy
- Block IPs showing malicious patterns
- Monitor for distributed attacks
- Document reasons for IP blocks
- Review blocked IPs periodically
3. User Blocking Guidelines
- Document violation reasons
- Review before permanent blocks
- Provide appeal mechanisms
- Monitor for block evasion attempts
4. Audit Trail Maintenance
- All security actions are logged
- Review logs daily for anomalies
- Investigate failed security events
- Export logs for compliance
5. Permission Management
- Follow principle of least privilege
- Super admins only for critical operations
- Use specific admin levels for delegation
- Regular permission audits
Threat Detection
Monitor for these security indicators:-
Multiple Failed Login Attempts
- Potential brute force attacks
- Account enumeration attempts
-
Unusual Access Patterns
- Access from new geographic locations
- Off-hours administrative actions
- Rapid succession of high-privilege operations
-
Data Access Anomalies
- Excessive user data queries
- Unusual export activities
- Pattern of accessing sensitive information
-
Payment Fraud Indicators
- Multiple failed payments from same user
- Suspicious KYC document patterns
- Rapid account creation and payment attempts
Security Client Component
The security management interface provides:- Block/unblock users
- Add/remove IP blocks
- View block history
- Search blocked entities
- Export block lists