Last updated

Security rules

Frontegg provides 8 built-in security defenses, each configurable with different actions when triggered. For example, you can allow inactive users to continue using your app but block them if they attempt to use a compromised password.


overview-1

Actions for each defense

DefenseDescriptionAllowChallengeBlockLock
Let the user continue to your appRequire MFA verification; if successful, allow the user to continuePrevent the user from logging inImmediately lock the user
Bot detectionIdentifies malicious bots to prevent security threats
New deviceAnalyzes device characteristics to detect potential security threats
Brute force protectionDetects repeated failed login attempts to prevent unauthorized access
Breached passwordBlocks use of passwords known to be compromised in data breaches
Impossible travelDetects logins from different locations within an unreasonably short timeframe
Suspicious IPsIdentifies suspicious IP activity, allowing detection or prevention of threats
Stale usersDeactivates inactive accounts to reduce security risks
Email credibility checkAllows only validated emails with good reputations at sign-up

Configuring security rules

To modify policies for any defense that Frontegg offers, users with an Admin role in the Frontegg account can access and adjust settings from the Security Rules page within any environment.