auth0.js v9 Reference
Auth0 can detect anomalies and stop malicious attempts to access your application. Anomaly detection can alert you and your users of suspicious activity, as well as block further login attempts. You can set preferences for notifications and decide whether to block a suspicious IP address or not.
Auth0 has two types of shields to handle anomalies and attacks.
A shield specifies the action you wish to take given a specific trigger. A trigger is a suspicious event that is detected when someone is trying to login to your system, or there may have been a breached password with another third party service.
Customize the actions in the Anomaly Detection section on the Dashboard.
- 10 consecutive failed login attempts for the same user and from the same IP address
- 100 failed login attempts from the same IP address in 24 hours or 50 sign up attempts per minute from the same IP address
For example, if a user with user_id1 signs in from IP1 and fails to login consecutively for 10 attempts, their log in attempt from this IP1 will be blocked. Another user, user_id2, signing in from IP1 will not be blocked.
Setup and initialization
Breached password detection
Every day, malicious hackers penetrate websites and applications, exposing thousands of email and passwords. Because it's common for users to use the same password to login to multiples sites, this poses a problem, not only for the hacked system, but to any application that shares those breached passwords.
Auth0 tracks large security breaches that are happening on major third party sites to help keep your users and system secure. By enabling breached password detection, when a trigger occurs, your users can be notified and/or blocked from logging in if we suspect their credentials were part of a published security breach. You can customize blocked account emails.