Skip to main content

Protected Auth

Ensure that only legitimate users can access your authentication flows.

Modes

  • Enforcement: React to Device Fingerprinting verdicts for your traffic.
  • Observation: Only observe Device Fingerprinting verdicts.

Protected methods

These authentication methods collect fingerprints and prevent actions when a fingerprint receives a BLOCK verdict:
  • impersonation.authenticate
  • magicLinks.authenticate
  • magicLinks.discovery.authenticate
  • magicLinks.email.discovery.send
  • oauth.authenticate
  • oauth.discovery.authenticate
  • otps.email.authenticate
  • otps.email.discovery.authenticate
  • otps.email.discovery.send
  • otps.email.loginOrSignup
  • otps.sms.authenticate
  • otps.sms.send
  • passwords.authenticate
  • passwords.discovery.authenticate
  • passwords.discovery.resetByEmail
  • passwords.discovery.resetByEmailStart
  • passwords.resetByEmail
  • passwords.resetByEmailStart
  • passwords.resetByExistingPassword
  • passwords.resetBySession
  • recoveryCodes.recover
  • recoveryCodes.rotate
  • sso.authenticate
  • totp.authenticate
  • totp.create
Protected Auth is a ready-made feature provided in the frontend and mobile SDKs.

New device notifications

Alert your users if a login is detected from a new device, IP address, or location so they can take immediate action if needed:

Additional ways to use Device Fingerprinting

Both features integrate Stytch’s Device Fingerprinting, which offers a device intelligence layer that can be used to prevent fraud and risk or provide device information as an additional user identifier. More examples on how to use Device Fingerprinting: