I should ignore the social login buttons on the admin access page cos social login do not have the privilege into the SuperUser user group which you need to get into the site administration pages
Not quite.
Are your admin users already linked to third party login services with SocialLogin?
- If yes: Use SocialLogin to log into your site, it's more secure.
- If not: You can't use SocialLogin, therefore the whole discussion is moot.
the suggestion you made in your marketing that it has the capability to spoof the Joomla identity of the site which seem too be a stretch by just renaming a syntax. I feel it'll take less than a minute to know its a Joomla site nonetheless, or what do you think?
The only "marketing" material I have is https://www.akeeba.com/products/admin-tools.html where I never make such a claim. Can you please show me where I made that claim?
Moreover, you also think about the generator meta tag, but that's completely tertiary. You really don't get it, do you? How does an attacker find your site? They use a search engine to look for common things that appear in Joomla! sites. Using the default generator meta tag is one of them, therefore changing that is recommended. If the attacker comes across your site a different way they will need to know if they have a chance to attack it. For that, they will need to enumerate your extensions and your extension and Joomla versions. The .htaccess Maker puts enough hurdles in place that makes this process very inaccurate. Ending up knowing that a site runs Joomla! version 3.9 to 5.0 is useless to an attacker and they are likely to not waste any time. Ending up knowing that a site runs Joomla! 4.0.1, on the other hand, gives the attacker an attack plan against known vulnerabilities which have since been fixed in Joomla!. So, no, saying that using security software to protect against fingerprinting (I don't know where the hell you got "spoof identity", that's a bullshit term nobody uses) is a good thing is absolutely not a stretch when you actually understand how sites get attacked.
does this protections blankets the inadvertent loop holes and vulnerabilities of other 3rd party extensions due to their weak coding practices etc. what specific feature of Admin Tool protects in such scenario
Yes, it does, to a great extent. No protection is absolute, though. If I had the magic way to make a blanket, absolutely perfect protection I would be selling it for billions of dollars to the FT 500 companies and governments, I would be sitting in a yacht sipping sugary drinks, and we would not be having this conversation. What Admin Tools does is put additional checks in place to prevent most common attacks against third party extensions and the core itself. Moreover, it mitigates the effect of the attack.
I will tell you two stories.
December 2015. A major SQL injection vulnerability existed in Joomla! and it was actively exploited in the wild. Unless, of course, you were using Admin Tools. Admin Tools' SQLiShield feature successfully caught and protected against this attack.
September 2023. A major flaw in AcyMailing which bypassed Joomla for file uploads results in thousands of sites being hacked, some of which belonging to the core Joomla! maintainers themselves. Unless, of course, you were using Admin Tools. Even though the attack vector was outside Admin Tools, the malicious uploaded file could not be executed thanks to the .htaccess Maker protections.
I've always likened security extensions to bulletproof vests. They will protect you against enemy fire to a reasonable degree. Now, if you get shot through the armhole, thrown a grenade, or shot with an M61 Vulcan you will die, no doubt about it. Security extensions will protect your site but if you are hacked from a script running outside of Joomla, because your entire server was compromised, or because you were targeted by an individual or organization with a great deal of resources you will be hacked. However, these are extremely unlikely scenarios. The vast majority of hacked sites are mundane, automated hacks perpetrated by lazy, boring criminals who want to make a quick buck sending spam and hosting malware. We don't live in a Hollywood technothriller; we live in the mundane reality, with its mundane dangers, with their mundane countermeasures. Security extensions like Admin Tools are these mundane countermeasures to these mundane dangers of our mundane reality.
As for which features in Admin Tools protect you, that would be all of them. That's the entire reason of its existence.
Other than this, you did not address my INSTAGRAM query :)
I don't know where you got that from. Definitely not my "marketing" material. Can you please show me where I made that claim?
If anything, there's this development ticket (https://github.com/akeeba/sociallogin/issues/5) which tells you why we could not implement a "Login with Instagram" back when Instagram and Facebook accounts were two separate things.
As things stand at the time of this writing, Meta no longer allows logging in with Instagram. They tell you to use Facebook login instead. In their Instagram API docs page https://developers.facebook.com/docs/instagram-api they explicitly state:
The API cannot access Instagram consumer accounts (i.e., non-Business or non-Creator Instagram accounts). If you are building an app for consumer users, use the Instagram Basic Display API instead.
However, when you go to the Instagram Basic Display API they tell you:
Authentication — Instagram Basic Display is not an authentication solution. Data returned by the API cannot be used to authenticate your app users or log them into your app. If you need an authentication solution we recommend using Facebook Login instead.
Facebook Login is already implemented in SocialLogin.
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!