Protected Auth
Ensure that only legitimate users can access your authentication flows.Modes
- Enforcement: React to Device Fingerprinting verdicts for your traffic.
- Observation: Only observe Device Fingerprinting verdicts.
Protected methods
These authentication methods collect fingerprints and prevent actions when a fingerprint receives aBLOCK verdict:
impersonation.authenticatemagicLinks.authenticatemagicLinks.discovery.authenticatemagicLinks.email.discovery.sendoauth.authenticateoauth.discovery.authenticateotps.email.authenticateotps.email.discovery.authenticateotps.email.discovery.sendotps.email.loginOrSignupotps.sms.authenticateotps.sms.sendpasswords.authenticate
passwords.discovery.authenticatepasswords.discovery.resetByEmailpasswords.discovery.resetByEmailStartpasswords.resetByEmailpasswords.resetByEmailStartpasswords.resetByExistingPasswordpasswords.resetBySessionrecoveryCodes.recoverrecoveryCodes.rotatesso.authenticatetotp.authenticatetotp.create