Documentation Index
Fetch the complete documentation index at: https://stytch.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
Protected Auth
Ensure that only legitimate users can access your authentication flows.Get started with Protected Auth
Using Protected Auth to defend your signup and login flows.
Modes
- Enforcement: React to Device Fingerprinting verdicts for your traffic.
- Observation: Only observe Device Fingerprinting verdicts.
Protected methods
These authentication methods collect fingerprints and prevent actions when a fingerprint receives aBLOCK verdict:
impersonation.authenticatemagicLinks.authenticatemagicLinks.discovery.authenticatemagicLinks.email.discovery.sendoauth.authenticateoauth.discovery.authenticateotps.email.authenticateotps.email.discovery.authenticateotps.email.discovery.sendotps.email.loginOrSignupotps.sms.authenticateotps.sms.sendpasswords.authenticate
passwords.discovery.authenticatepasswords.discovery.resetByEmailpasswords.discovery.resetByEmailStartpasswords.resetByEmailpasswords.resetByEmailStartpasswords.resetByExistingPasswordpasswords.resetBySessionrecoveryCodes.recoverrecoveryCodes.rotatesso.authenticatetotp.authenticatetotp.create
New device notifications
Alert your users if a login is detected from a new device, IP address, or location so they can take immediate action if needed:New device notifications guide
Detect new devices to trigger user notifications.
Additional ways to use Device Fingerprinting
Both features integrate Stytch’s Device Fingerprinting, which offers a device intelligence layer that can be used to prevent fraud and risk or provide device information as an additional user identifier. More examples on how to use Device Fingerprinting:Invisible CAPTCHA
Add an invisible bot protection for a smooth user experience.
Prevent free trial abuse
Stop fake account creation abuse.
Block traffic by country
Use IP-based geographic filters for access control.
Remembered device
Add a remembered device flow.