Login Anomaly Detection via ThisData

How it works?

This rule is designed to detect phished or compromised user accounts. Even if the primary user authentication is approved it will deny access to a user if the login appears to be highly suspicious.

It relies on the ThisData anomaly detection algorithms which take into account many behavioural factors including:

  • Location & Velocity
  • Devices
  • Time of day
  • Tor usage
  • Risky IP addresses
  • And more...

###What happens if an anomaly is detected? It uses to get a risk score for the login and then blocks the login by raising an UnauthorizedErrorerror if the risk is very high.

###Prerequisites You will need a ThisData API Key. Sign up for a free ThisData account at https://thisdata.com/sign-up

How do I use it?

Just create a new rule in the Auth0 dashboard, and copy the following code replacing the placeholders with the appropriate values.

What is a Rule?

A rule is arbitrary JavaScript code that can be used to extend Auth0s default behavior when authenticating a user. Enabled rules will be executed in the order shown below for all users and applications as the final step of theauthentication process.

Rules can be used to enrich and transform the user profile, deny access to specific users under certain conditions, retrieve information from external services and much more. For more information about rules, please check the documentation