Configure brute force protection
Setting up brute force protection prevents automated attacks that try thousands of password combinations to break into user accounts.
💡 Why this matters
Protects against automated login attacks while allowing legitimate users normal access. Meets compliance requirements for account security.
Available protection types
Protection type | Protects against | Common attack scenarios |
---|---|---|
MFA | MFA bypass attempts | Automated code guessing |
Client authentication | API client attacks | Service credential abuse |
Device handling | Device registration abuse | Mobile app exploitation |
Identity code verify | Verification code attacks | SMS/email code brute force |
Identity registration | Account creation abuse | Signup form attacks |
Configure protection settings
-
Go to Tenant Settings > Brute-force Protection
-
Select the protection type you want to configure, like MFA, or Client authentication, and so on.
-
Set the following values:
Setting Recommended Value Notes Max Attempts 3-5 attempts Industry standard for most scenarios Block Duration 5-15 minutes Balances security with user experience -
Save your changes.
Industry-standard configurations
Different environments require different protection levels based on risk tolerance and user impact:
Environment Type | Max Attempts | Block Duration | Rationale |
---|---|---|---|
Internal/Development | 5 | 5 minutes | Higher tolerance for legitimate mistakes |
Partner/B2B Access | 3-5 | 10-15 minutes | Balance security with business relationships |
Public/Consumer | 3 | 15-30 minutes | Strong protection for exposed endpoints |
Regulated Industries | 2-3 | 30+ minutes | Compliance requirements, zero tolerance |
Operation-specific considerations
- MFA operations: Use lower thresholds (2-3 attempts) - codes are time-sensitive
- Client authentication: Standard thresholds (5 attempts) - service accounts need reliability
- Identity operations: Lower thresholds (3 attempts) - registration/recovery are high-risk
Advanced configuration
API automation
Use the Brute Force Limits API for:
- Automated policy deployment across environments
- Integration with security monitoring systems
- Programmatic threshold adjustments
Disabling protection (controlled environments only)
Only disable brute force protection in isolated test environments with no production data
When you might need to disable:
- Load testing authentication endpoints
- Automated testing scenarios
- Development environment debugging
How to disable safely:
Method | Configuration | Use case |
---|---|---|
Complete disable | Set Max Attempts = 0 | Full testing scenarios |
Effective disable | Set Max Attempts = 50+ | Simulate no limits while maintaining logging |
Safety measures:
- Document the business justification
- Set calendar reminder to re-enable immediately after testing
- Monitor for any unusual authentication patterns
- Verify no production traffic can reach the test environment
⚠️ Re-enable immediately: Leaving protection disabled increases exposure to credential stuffing, account takeover, and service disruption attacks