- Role-based route protection enabled for JSP and servlet endpoints.
- Global security response headers configured.
- New and seeded passwords stored with PBKDF2 hashes.
- Legacy plaintext passwords remain login-compatible during migration window.
- Force HTTPS at reverse proxy/load balancer.
- Set
HttpOnly,Secure, andSameSitefor session cookies at container level. - Rotate all default seeded account passwords before go-live.
- Unauthorized access to role routes returns redirect or 403.
- Session-based role checks enforced for Admin, Client roles, and Scanner role.
- Add account lockout policy for repeated failed logins.
- Add password reset flow with signed expiring tokens.
- Add admin audit logs for privilege-sensitive actions.
- Registration rejects blank fields and weak credentials (<8 chars).
- Email normalization and role validation enforced on auth path.
- Add server-side institutional domain validation for student-only events.
- Add stronger password policy (upper/lower/number/special).
- Add unique index checks and conflict responses for duplicate accounts.
- Scanner dashboard includes manual validation fallback with immediate result feedback.
- Basic vibration/audio feedback implemented for success/failure outcomes.
- Integrate live camera scanning endpoint and decode service.
- Add replay protection for already-used ticket codes.
- Persist scanner validation logs with guard ID and timestamp.
- Landing, selection, login, and signup flows modernized and responsive.
- Registration success and failure messaging implemented.
- Add CSRF protection tokens to all POST forms.
- Add rate limiting and bot detection for login and signup routes.
- Add accessibility checks (keyboard tab order, contrast, aria labels).
- Admin dashboard replaced with operational control surface.
- Connect dashboard metrics to real database aggregates.
- Add event create/update/delete admin workflow with validation.
- Add financial report export and reconciliation view.
- Add guard and manager provisioning workflow.
- Install Ant in build environment (
apt install ant) and runant clean compile. - Verify GlassFish datasource and Derby/Oracle connectivity in target environment.
- Externalize DB host/user/password through environment-specific config.
- Configure centralized logging and error tracing.
- Add automated backup/restore for database.
- Run smoke tests for all roles: Admin, Attendee, Presenter, Event Manager, Venue Guard.
Release only when all unchecked items above are completed or explicitly risk-accepted by the project owner.