Protected Auth
Ensure that only legitimate users can access your authentication flows.Get started with Protected Auth
Using Protected Auth to defend your signup and login flows.
Modes
- Enforcement: React to Device Fingerprinting verdicts for your traffic.
- Observation: Only observe Device Fingerprinting verdicts.
Protected methods
These authentication methods collect fingerprints and prevent actions when a fingerprint receives aBLOCK verdict:
biometrics.authenticatecryptoWallets.authenticateimpersonation.authenticatemagicLinks.email.loginOrCreatemagicLinks.email.sendotps.authenticateotps.email.loginOrCreateotps.sms.loginOrCreateotps.sms.sendotps.whatsapp.loginOrCreate
otps.whatsapp.sendpasswords.authenticatepasswords.createpasswords.resetByEmailpasswords.resetByEmailStartpasswords.resetByExistingPasswordpasswords.resetBySessiontotps.authenticatetotps.recoverwebauthn.authenticate
New device notifications
Alert your users if a login is detected from a new device, IP address, or location so they can take immediate action if needed:New device notifications guide
Detect new devices to trigger user notifications.
Additional ways to use Device Fingerprinting
Both features integrate Stytch’s Device Fingerprinting, which offers a device intelligence layer that can be used to prevent fraud and risk or provide device information as an additional user identifier. More examples on how to use Device Fingerprinting:Invisible CAPTCHA
Add an invisible bot protection for a smooth user experience.
Prevent free trial abuse
Stop fake account creation abuse.
Block traffic by country
Use IP-based geographic filters for access control.
Remembered device
Add a remembered device flow.