Skip to main content

Configure brute force protection

Setting up brute force protection prevents automated attacks that try thousands of password combinations to break into user accounts.

💡 Why this matters
Protects against automated login attacks while allowing legitimate users normal access. Meets compliance requirements for account security.

Available protection types

Protection typeProtects againstCommon attack scenarios
MFAMFA bypass attemptsAutomated code guessing
Client authenticationAPI client attacksService credential abuse
Device handlingDevice registration abuseMobile app exploitation
Identity code verifyVerification code attacksSMS/email code brute force
Identity registrationAccount creation abuseSignup form attacks

Configure protection settings

  1. Go to Tenant Settings > Brute-force Protection

  2. Select the protection type you want to configure, like MFA, or Client authentication, and so on.

  3. Set the following values:

    SettingRecommended ValueNotes
    Max Attempts3-5 attemptsIndustry standard for most scenarios
    Block Duration5-15 minutesBalances security with user experience
  4. Save your changes.

Industry-standard configurations

Different environments require different protection levels based on risk tolerance and user impact:

Environment TypeMax AttemptsBlock DurationRationale
Internal/Development55 minutesHigher tolerance for legitimate mistakes
Partner/B2B Access3-510-15 minutesBalance security with business relationships
Public/Consumer315-30 minutesStrong protection for exposed endpoints
Regulated Industries2-330+ minutesCompliance requirements, zero tolerance

Operation-specific considerations

  • MFA operations: Use lower thresholds (2-3 attempts) - codes are time-sensitive
  • Client authentication: Standard thresholds (5 attempts) - service accounts need reliability
  • Identity operations: Lower thresholds (3 attempts) - registration/recovery are high-risk

Advanced configuration

API automation

Use the Brute Force Limits API for:

  • Automated policy deployment across environments
  • Integration with security monitoring systems
  • Programmatic threshold adjustments

Disabling protection (controlled environments only)

Critical security warning

Only disable brute force protection in isolated test environments with no production data

When you might need to disable:

  • Load testing authentication endpoints
  • Automated testing scenarios
  • Development environment debugging

How to disable safely:

MethodConfigurationUse case
Complete disableSet Max Attempts = 0Full testing scenarios
Effective disableSet Max Attempts = 50+Simulate no limits while maintaining logging

Safety measures:

  1. Document the business justification
  2. Set calendar reminder to re-enable immediately after testing
  3. Monitor for any unusual authentication patterns
  4. Verify no production traffic can reach the test environment

⚠️ Re-enable immediately: Leaving protection disabled increases exposure to credential stuffing, account takeover, and service disruption attacks