Skip to main content

User Attack Protection

Overview

User Attack Protection provides a comprehensive security layer to safeguard user accounts from malicious activities, such as brute force attacks, bot intrusions, and unauthorized access attempts. Various security features enhance authentication processes' integrity and minimize potential threats.

Key Features

  • Brute Force Protection

    Brute Force Lockout allows you to restrict account access based on the number of failed logins OR reset passwords by token/OTP attempts. If a user enters incorrect credentials ( username and password) in the Login API OR enters the incorrect token/ OTP and reaches the threshold limit set in the Admin Console, a Brute Force Lockout action will be triggered for further API calls.

  • Breached Password Protection

    To enhance security, the system detects and prevents the usage of compromised passwords. If users' credentials are found in known breached password lists, the system prompts them to reset their password, ensuring higher account safety.

  • Bot Protection

    Bot Protection adds an extra layer of security by dynamically triggering CAPTCHA challenges at various authentication stages. You can configure this by selecting multiple APIs in the Admin Console under the "Bot Protection Allowed On APIs" settings. This measure helps prevent automated bot attacks on user authentication flows.

  • Domain Access Management

    Control registration access by whitelisting/blacklisting domain names and email IDs. This feature enables organizations to restrict access to certain users based on their domain, reducing the risk of unauthorized registrations and fraudulent account creation.

Use Cases

  • Preventing Unauthorized Access Attempts

    Brute force protection ensures that if an attacker tries to guess a password through repeated attempts, the account gets locked after a defined threshold, mitigating unauthorized access.

  • Protecting Users from Credential Stuffing Attacks

    Breached password protection ensures that users do not use compromised passwords, which attackers could exploit using credential-stuffing techniques.

  • Blocking Automated Bot Attacks

    Bot protection prevents malicious automated scripts from bypassing authentication processes, ensuring that only legitimate users can gain access.

  • Restricting Access Based on Organizational Policies

    Domain access management allows enterprises to restrict sign-ups to specific domains (e.g., corporate emails only), preventing unauthorized or fraudulent registrations.

By leveraging these security measures, User Attack Protection strengthens authentication mechanisms, reduces security risks, and enhances overall user account security.

Configuration

Brute Force Lockout prevents unauthorized access by restricting account access after multiple failed login or password reset attempts. If a user exceeds the threshold set in the Admin Console, their account may be locked, suspended, or challenged with CAPTCHA or security questions, depending on the selected lockout type. The system then updates the user's profile with the lockout status.

Configuration Steps:

  1. Navigate to Brute Force Lockout in the Admin console.
  2. Set the threshold for failed login attempts.
  3. Define the lockout type and duration.
  4. Save the settings.

This document provides detailed information on Brute Force Lockout customization and configuration.