Brute-force protections

Brute-force protection can guard against any attack that tries to crack secrets, such as passwords or passcodes by trial and error. It halts malicious actors once they reach the limit for unsuccessful attempts. Limiting the number of password or temporary passcode attempts should be one of your top priorities when it comes to account security.

Account lockout illustration

While the resulting account lockout can mitigate brute force attacks, dictionary attacks, and credential stuffing, it can also lead to an unpleasant user experience. It's worth factoring in the honest mistakes legitimate users make when trying to log in when you set up restrictions. Strivacity's brute-force protection controls help you strike the right balance between ease of use and the risk levels specific to your organization.

Settings

Brute-force protection rules allow you to set how accounts can be disabled based on failed passwords and/or one-time passcode attempts.

Password failed attempts restrictionDescriptionStatus
Terminate user session after ... attemptsDefines the number of unsuccessful tries a user can have when entering their password before they get locked out of the account.3 tries are allowed by default.
Account lockoutYou can permanently lock accounts if the number of unsuccessful attempts reaches the limit.Disabled by default. When enabled, 10 attempts are allowed by default.
Lockout durationDefines the number of minutes a locked account can't be used. Users can try to log in again once the account lockout period expires.Disabled by default. When enabled, the duration is set to 15 minutes by default.
Failed OTP/TOTP restrictionDescriptionStatus
Terminate user session after ... attemptsDefines the number of unsuccessful tries a user can have when entering a passcode before they get locked out of the account.3 tries are allowed by default.
Account lockout durationDefines the number of minutes a locked account can't be used. Users can try to log in again once the account lockout period expires.Disabled by default. When enabled, the duration is set to 15 minutes by default.
Permanent account lockoutYou can permanently lock accounts if the number of unsuccessful tries reaches the limit.Disabled by default.

📘

Permanent lockout

Users can turn to your customer support if they permanently get locked out of their accounts. Customer service can assist them with account recovery tools from the Admin Console.

Identifier failed attempts restrictionDescriptionStatus
Terminate user session after ... attemptsDefines the number of unsuccessful tries a user can have when entering an identifier before they get locked out of the account.3 tries are allowed by default.