FusionAuth developer image
FusionAuth developer logo
  • Back to site
  • Expert Advice
  • Blog
  • Developers
  • Downloads
  • Account
  • Contact sales
Navigate to...
  • Welcome
  • Getting Started
    • Getting Started
    • 5-minute Setup Guide
      • Overview
      • Docker
      • Fast Path
      • Sandbox
    • Setup Wizard & First Login
    • Register a User and Login
    • Self-service Registration
    • Start and Stop FusionAuth
    • Core Concepts
      • Overview
      • Users
      • Roles
      • Groups
      • Registrations
      • Applications
      • Tenants
      • Identity Providers
      • Authentication/Authorization
      • Integration Points
    • Example Apps
      • Overview
      • Dart
      • Go
      • Java
      • JavaScript
      • .NET Core
      • PHP
      • Python
      • Ruby
    • Tutorials
  • Installation Guide
    • Overview
    • System Requirements
    • Server Layout
    • Cloud
    • Cluster
    • Docker
    • Fast Path
    • Kubernetes
      • Overview
      • Deployment Guide
      • Minikube Setup
      • Amazon EKS Setup
      • Google GKE Setup
      • Microsoft AKS Setup
    • Kickstart™
    • Homebrew
    • Marketplaces
    • Packages
    • Database
    • FusionAuth App
    • FusionAuth Search
    • Common Configuration
  • Migration Guide
    • Overview
    • General
    • Auth0
    • Keycloak
    • Amazon Cognito
    • Firebase
    • Microsoft Azure AD B2C
    • Tutorial
  • Admin Guide
    • Overview
    • Account Portal
    • Config Management
    • Editions and Features
    • Key Rotation
    • Licensing
    • Monitoring
    • Prometheus Setup
    • Proxy Setup
    • Reference
      • Overview
      • Configuration
      • CORS
      • Data Types
      • Hosted Login Pages Cookies
      • Known Limitations
      • Password Hashes
    • Releases
    • Roadmap
    • Search And FusionAuth
    • Securing
    • Switch Search Engines
    • Technical Support
    • Troubleshooting
    • Upgrading
    • WebAuthn
  • Login Methods
    • Identity Providers
      • Overview
      • Apple
      • Epic Games
      • External JWT
        • Overview
        • Example
      • Facebook
      • Google
      • HYPR
      • LinkedIn
      • Nintendo
      • OpenID Connect
        • Overview
        • Amazon Cognito
        • Azure AD
        • Discord
        • Github
      • Sony PlayStation Network
      • Steam
      • Twitch
      • Twitter
      • SAML v2
        • Overview
        • ADFS
        • Azure AD
      • SAML v2 IdP Initiated
        • Overview
        • Okta
      • Xbox
    • OIDC & OAuth 2.0
      • Overview
      • Endpoints
      • Tokens
      • OAuth Modes
    • Passwordless
      • Overview
      • Magic Links
      • WebAuthn & Passkeys
    • SAML v2 IdP
      • Overview
      • Google
      • Zendesk
  • Developer Guide
    • Overview
    • API Gateways
      • Overview
      • ngrok Cloud Edge
    • Client Libraries & SDKs
      • Overview
      • Dart
      • Go
      • Java
      • JavaScript
      • .NET Core
      • Node
      • OpenAPI
      • PHP
      • Python
      • React
      • Ruby
      • Typescript
    • Events & Webhooks
      • Overview
      • Writing a Webhook
      • Securing Webhooks
      • Events
        • Overview
        • Audit Log Create
        • Event Log Create
        • JWT Public Key Update
        • JWT Refresh
        • JWT Refresh Token Revoke
        • Kickstart Success
        • Group Create
        • Group Create Complete
        • Group Delete
        • Group Delete Complete
        • Group Update
        • Group Update Complete
        • Group Member Add
        • Group Member Add Complete
        • Group Member Remove
        • Group Member Remove Complete
        • Group Member Update
        • Group Member Update Complete
        • User Action
        • User Bulk Create
        • User Create
        • User Create Complete
        • User Deactivate
        • User Delete
        • User Delete Complete
        • User Email Update
        • User Email Verified
        • User IdP Link
        • User IdP Unlink
        • User Login Failed
        • User Login Id Dup. Create
        • User Login Id Dup. Update
        • User Login New Device
        • User Login Success
        • User Login Suspicious
        • User Password Breach
        • User Password Reset Send
        • User Password Reset Start
        • User Password Reset Success
        • User Password Update
        • User Reactivate
        • User Reg. Create
        • User Reg. Create Complete
        • User Reg. Delete
        • User Reg. Delete Complete
        • User Registration Update
        • User Reg. Update Complete
        • User Reg. Verified
        • User 2FA Method Add
        • User 2FA Method Remove
        • User Update
        • User Update Complete
    • Guides
      • Overview
      • Authentication Tokens
      • Exposing A Local Instance
      • JSON Web Tokens
      • Key Master
      • Localization and Internationalization
      • Multi-Factor Authentication
      • Multi-Tenant
      • Passwordless
      • Registration-based Email Verification
      • Searching With Elasticsearch
      • Securing Your APIs
      • Silent Mode
      • Single Sign-on
      • Two Factor (pre 1.26)
    • Integrations
      • Overview
      • CleanSpeak
      • Kafka
      • Twilio
    • Plugins
      • Overview
      • Writing a Plugin
      • Custom Password Hashing
    • User Control & Gating
      • Overview
      • Gate Unverified Users
      • Gate Unverified Registrations
      • User Account Lockout
  • Customization
    • Email & Templates
      • Overview
      • Configure Email
      • Email Templates
      • Email Variables
      • Message Templates
    • Lambdas
      • Overview
      • Apple Reconcile
      • Client Cred. JWT Populate
      • Epic Games Reconcile
      • External JWT Reconcile
      • Facebook Reconcile
      • Google Reconcile
      • HYPR Reconcile
      • JWT Populate
      • LDAP Connector Reconcile
      • LinkedIn Reconcile
      • Nintendo Reconcile
      • OpenID Connect Reconcile
      • SAML v2 Populate
      • SAML v2 Reconcile
      • SCIM Group Req. Converter
      • SCIM Group Resp. Convtr.
      • SCIM User Req. Converter
      • SCIM User Resp. Converter
      • Sony PSN Reconcile
      • Steam Reconcile
      • Twitch Reconcile
      • Twitter Reconcile
      • Xbox Reconcile
    • Messengers
      • Overview
      • Generic Messenger
      • Twilio Messenger
    • Themes
      • Overview
      • Examples
      • Helpers
      • Localization
      • Template Variables
  • Premium Features
    • Overview
    • Advanced Registration Forms
    • Advanced Threat Detection
    • Application Specific Themes
    • Breached Password Detection
    • Connectors
      • Overview
      • Generic Connector
      • LDAP Connector
      • FusionAuth Connector
    • Entity Management
    • SCIM
      • Overview
      • Azure AD Client
      • Okta Client
      • SCIM-SDK
    • Self Service Account Mgmt
      • Overview
      • Updating User Data & Password
      • Add Two-Factor Authenticator
      • Add Two-Factor Email
      • Add Two-Factor SMS
      • Add WebAuthn Passkey
      • Customizing
      • Troubleshooting
    • WebAuthn
  • APIs
    • Overview
    • Authentication
    • Errors
    • API Explorer
    • Actioning Users
    • API Keys
    • Applications
    • Audit Logs
    • Connectors
      • Overview
      • Generic
      • LDAP
    • Consents
    • Emails
    • Entity Management
      • Overview
      • Entities
      • Entity Types
      • Grants
    • Event Logs
    • Families
    • Forms
    • Form Fields
    • Groups
    • Identity Providers
      • Overview
      • Links
      • Apple
      • External JWT
      • Epic Games
      • Facebook
      • Google
      • HYPR
      • LinkedIn
      • Nintendo
      • OpenID Connect
      • SAML v2
      • SAML v2 IdP Initiated
      • Sony PlayStation Network
      • Steam
      • Twitch
      • Twitter
      • Xbox
    • Integrations
    • IP Access Control Lists
    • JWT
    • Keys
    • Lambdas
    • Login
    • Message Templates
    • Messengers
      • Overview
      • Generic
      • Twilio
    • Multi-Factor/Two Factor
    • Passwordless
    • Reactor
    • Registrations
    • Reports
    • SCIM
      • Overview
      • SCIM User
      • SCIM Group
      • SCIM EnterpriseUser
      • SCIM Service Provider Config.
    • System
    • Tenants
    • Themes
    • Users
    • User Actions
    • User Action Reasons
    • User Comments
    • WebAuthn
    • Webhooks
  • Release Notes

    Advanced Threat Detection

    FusionAuth Reactor logo

    This feature is only available in the Enterprise plan. Please visit our pricing page to learn more.

    Overview

    Available since 1.30.0

    Flagging and responding to suspicious behavior is a part of any cybersecurity product. Advanced Threat Detection, a feature that brings best-practice functionality to help you deal with bizarre, possibly malicious behavior around logins, registrations, user creation, and user updates.

    Turning this feature on requires a support ticket, as it is being rolled out on an account by account basis.

    To enable Advanced Threat Detection, submit a support ticket through your account portal and request it be turned on.

    This feature also requires increased RAM on the servers running the FusionAuth application, as documented in the System Requirements.

    Advanced Threat Detection includes:

    • Customizable Rate Limiting

    • CAPTCHA

    • Location Aware Security

    • IP ACLs

    • Registration Domain Blocking

    • Webhook Events

    • Security Emails

    Each is configurable on a tenant by tenant basis. You can do so via the Tenant API or by navigating to Tenants → My Tenant → Security.

    Here’s a brief video covering some aspects of Advanced Threat Detection:

    Customizable Rate Limiting

    These are per user rate limits for the following user actions:

    • Failed login

    • Forgot password

    • Send or resend email verification

    • Passwordless/magic link login

    • Send or resend registration verification

    • Send two-factor code

    The rate limiting configuration screen.

    You can enable or disable each of these and control the number of allowed attempts within a window before an action will be rate limited. When an action is rate limited, it will not succeed.

    When configured, rate limiting applies whether you are using the hosted login pages or the APIs.

    If you need to lock an account after a number of failed logins, consider user account locking. Using the account lockout feature rather than rate limiting offers additional flexibility in the duration. You can also send emails or fire webhooks when a user’s account is locked.

    CAPTCHA

    CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart, and can provide additional security. FusionAuth will require a CAPTCHA in certain circumstances such as when a device has never been seen before.

    There are a variety of paid and free CAPTCHAs supported, including Google ReCaptcha and HCaptcha.

    Location Aware Security

    FusionAuth has location information for requests and uses it in a variety of ways to secure user accounts. These are all configurable and controllable by developers integrating FusionAuth into their applications.

    Some location aware features include:

    • Inside of every Forgot/Reset Password email sent to a user, the geographic location of where the password reset request was made is displayed. The recipient can determine if the location of the requester seems suspicious.

    • Flag suspicious login events and notify the user of a new login with the approximate location. A webhook is also sent.

    • Calculates "impossible travel" to see if a user could realistically log in at different locations around the globe in a reasonable time frame.

    • When a login request occurs from an unexpected IP address, a user receives an email to notify them of a new login with an approximate location of the IP address.

    IP ACLs

    For security purposes, you may want to lock down an application or API key to a certain IP address or range of IP addresses.

    With Advanced Threat Detection, you can do this. Create an IP address access control list (IP ACL):

    The IP access control list configuration screen.

    Then apply it to an application (if using the hosted login pages). This will prevent a user from being able to even access an application login page if they are not in the IP address range. If you have internal applications or applications to which access should otherwise be limited, this feature can help lock those applications down.

    Applying an IP ACL to an application.

    You can also lock down an API key to a given range with an IP ACL. This is useful if you are managing your FusionAuth configuration via a CI/CD system. You can create an API key to modify configurations, but limit that key to the IP address range of your CI/CD system, increasing security and lowering the risk of the API key being used incorrectly.

    Applying an IP ACL to an API key.

    Registration Domain Blocking

    If you enable self service registration, users can provide any email address they like. But you may have email domains that have elevated privileges, like your company.com domain. There may be email addresses for which you want to block registration, like consumer gmail.com addresses if your application is aimed at business users.

    In either of these cases, you can block one or more domains from the registration process using Advanced Threat Detection.

    Blocking consumer facing domains from registering.

    Webhook Events

    There are a number of security related events that your SIEM or other analytics systems may want to ingest, such as when MFA has been disabled for a user or when a user has requested a password reset.

    Here’s the full list of Advanced Threat Detection webhooks:

    • User Login Id Duplicate Create - when a request to create a user with an already in-use login Id (email or username) has been received

    • User Login Id Duplicate Update - when a request to update a user with an already in-use login Id (email or username) has been received

    • User Login New Device - when a user begins login with a new device

    • User Login Suspicious - when a user complete login and is considered to be a potential threat

    • User Password Reset Send - when a forgot password email has been sent to a user

    • User Password Reset Start - when a user starts the reset password flow

    • User Password Reset Success - when a user password reset flow has completed successfully

    • User Password Update - when a user’s password is updated

    • User Two-factor Method Add - when a user has added a two-factor method

    • User Two-factor Method Remove - when a user has removed a two-factor method

    Security Emails

    Emails can be sent to the user when certain security-related events occur. You can add your own email templates. There is a sample "Threat Detected" email template which documents available variables. Security related emails may be localized like any other email template.

    Here are the security events for which you can send emails:

    • Login Id duplicate on create - someone tried to create a user which collided with an existing username or password

    • Login Id duplicate on update - someone tried to update a user to have a loginId which collided with an existing username or password

    • Login with new device - someone logged in with a device not previously used

    • Suspicious login - the login has been flagged by FusionAuth as suspicious

    • Password reset success - a successful 'forgot password' flow for the user has completed

    • Password update - a user’s password has been updated by any means

    • Two-factor method added - an MFA method was added to a user’s account

    • Two-factor method removed - an MFA method was removed to a user’s account

    You can set these up by navigating to Tenant → Your Tenant → Email → Template Settings.

    List of email templates.

    Feedback

    How helpful was this page?

    See a problem?

    File an issue in our docs repo

    Have a question or comment to share?

    Visit the FusionAuth community forum.

    © 2023 FusionAuth
    Subscribe for developer updates