Secure and monitor documentation
Advanced Threat Detection
Learn about the FusionAuth Advanced Threat Detection feature that provides various tools to secure your application.
Breached Password Detection
Learn how to configure and use breached password detection.
CloudWatch Setup
Learn how to set up CloudWatch to work with FusionAuth.
CORS Reference
Learn about FusionAuth and Cross-Origin Resource Sharing (CORS) configuration.
Datadog Setup
Learn how to set up Datadog to work with FusionAuth.
FusionAuth Vulnerabilities
Learn more about known CVEs and how they affect FusionAuth.
Key Master
An overview of FusionAuth Key Master, used to manage signing keys and certificates.
Key Rotation
Learn how to rotate keys in FusionAuth.
Monitor With Elastic
Learn how to monitor FusionAuth with Elastic.
Monitor With OpenTelemetry
Learn How To Monitor FusionAuth With OpenTelemetry.
Monitor With Slack
Learn how to monitor FusionAuth with Slack.
Monitoring FusionAuth
Understand how your FusionAuth instance is operating by monitoring it.
Networking Configuration
Learn about FusionAuth networking configuration.
Prometheus Setup
Learn how to set up Prometheus to work with FusionAuth.
Securing FusionAuth services
Learn how to secure your installation by limiting network traffic.
Splunk Setup
Learn how to set up Splunk to work with FusionAuth.