Last updated

Security rules

Frontegg provides 8 built-in security defenses, each configurable with different actions when triggered. For example, you can allow inactive users to continue using your app but block them if they attempt to use a compromised password.


overview-1

Actions for each defense

DefenseDescriptionAllowChallengeBlockLock
Bot detectionIdentifies malicious bots to prevent security threats✓✓✓✓
New deviceAnalyzes device characteristics to detect potential security threats✓✓
Brute force protectionDetects repeated failed login attempts to prevent unauthorized access✓✓
Breached passwordBlocks use of passwords known to be compromised in data breaches✓✓✓
Impossible travelDetects logins from different locations within an unreasonably short timeframe✓✓✓
Suspicious IPsIdentifies suspicious IP activity, allowing detection or prevention of threats✓✓✓✓
Stale usersDeactivates inactive accounts to reduce security risks✓✓✓
Email credibility checkAllows only validated emails with good reputations at sign-up✓✓

Configuring security rules

To modify policies for any defense that Frontegg offers, users with an Admin role in the Frontegg account can access and adjust settings from the Security Rules page within any environment.