/
Contact usSee pricingStart building

    About Stytch Fraud and Risk

    Introduction
    Use cases
    Device Fingerprinting
      Overview
      Fingerprints
    • Verdicts

      • Verdicts overview
        Allow
        Block
        Challenge
        Not Found
    Getting started
      Device Fingerprinting API
      DFP Protected Auth
    Decisioning
      Decisioning overview
      Setting rules with DFP
      Overriding verdict reasons
      Intelligent Rate Limiting
    Enforcement
      Enforcement overview
    • Protected Auth

      • Overview
        Handling challenges
    Integration steps
      Configure custom domains
      Test your integration
      Privacy and compliance considerations
    Reference
      Warning Flags (Verdict Reasons)
Get support on SlackVisit our developer forum

Contact us

Fraud and Risk Prevention

/

Guides

/

About Stytch Fraud and Risk

/

Introduction

Fraud Prevention powered by Stytch

Getting started

Device Fingerprinting (DFP)

Learn how DFP provides high-confidence signals and verdicts, so that you can prevent fraud and improve UX.

Getting started with the Device Fingerprinting API

Add Device Fingerprinting to your application in under an hour.

DFP Protected Auth

Turn on Protected Auth for Stytch B2B SaaS or Consumer Authentication to stop account takeovers and other bot attacks.

Decisioning with Device Fingerprinting

Distinguish between good users and bad actors with Verdicts, Rules, and your own custom logic.

Enforcement with Device Fingerprinting

Explore your options to add or reduce friction in the user experience.

Intelligent Rate Limiting (IntRL)

Learn how Stytch stops high-velocity attackers using Device Fingerprinting and Intelligent Rate Limiting.