PeepSo login and logout options are scattered on multiple locations to make more sense with backend layout and navigation.
If you wish to redirect users after login or logout, you can do this in WP Admin -> PeepSo -> Configuration -> Navigation under “Login and Logout” panel.
Security settings can be found in WP Admin -> PeepSo -> Configuration -> Accounts and Security
ReCaptchaduring registration Add invisible ReCaptcha to registration process
Add invisible ReCaptcha to login process
Google invisible ReCaptcha site key
Google invisible ReCaptcha secret key
Use ReCaptcha Globally
Enable: will use “www.recaptcha.net” in circumstances when “www.google.com” is not accessible.
Minimum password length
Applies only to new passwords. This was introduced as a setting after a user pointed out on our registration there’s just a simple 6 character password being required. We made this configurable with a new default minimum of at least 10 characters per password. The minimum password length is a new feature and not really related directly to the brute force settings. Nevertheless, it is related to login security. It doesn’t matter whether the brute force protection is enabled or not, the minimum password length setting is self-contained.
Password reset delay since 18.104.22.168, admin can now define a custom delay between password reset requests (brute force protection).
Check “remember me” by default Enable: “Remember me” checkbox on the login form will be checked by default
No – Use username/e-mail for login
Administrators – Use e-mail login for Administrators only
Everyone – Use e-mail login for everyone
Login nonce check Since 2.7.7. Admin can now disable the security nonce check during PeepSo login. This will prevent PeepSo login failed error on highly cached systems, while using third-party caching plugins like WP Rocket, W3 Total Cache, Litespeed, or other similar plugins that return login failed error during the login, since PeepSo will stop validating the (potentially over-cached) security login nonce. Using this setting is generally not recommended, as it lowers the systems resilience against brute force attacks, but it will be reasonably safe in a properly configured and secure environment with brute force protection enabled.
Enable Login brute force protection Enable Login brute force protection settings
Block login after
Maximum failed attempts allowed.
hours: minutes – how long to block login attempts after the above limit is reached.
Send an e-mail notification to the user, warning them about failed login attempts.
Enable additional block after
Additional security when users block themselves repeatedly.
Additional block length
How long to block login attempts when additional security is triggered.
Reset retries after
How long it takes for the system to “forget” about a failed login attempt.
list of IP addresses whitelisted from brute-force protection, one IP per line
Note: All these settings will only work on PeepSo login forms and PeepSo widgets. These settings will not take effect if you decide to use third-party login forms or widgets.
Was this helpful?1 out of 4 people found this useful