Skip to content

Commit 1b77a9b

Browse files
authored
Merge pull request #319 from kinde-oss/Feat/Enumeration-attacks
Feat/Credential enumeration protection
2 parents 2c2a55f + 48f1076 commit 1b77a9b

File tree

1 file changed

+12
-1
lines changed

1 file changed

+12
-1
lines changed

src/content/docs/build/set-up-options/attack-protection.mdx

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,22 @@ Attack protection is always on, and Kinde ships with sensible defaults to keep y
1717
4. Set how long the account lockout lasts before users can sign in again. You can accept the Kinde default of 5 minutes or set a custom time, up to 60 minutes.
1818
5. Select **Save**.
1919

20-
## What counts as a failed sign-in attempt
20+
### What counts as a failed sign-in attempt
2121

2222
- incorrect password entered
2323
- incorrect OTP code entered
2424
- incorrect recovery code entered
2525
- incorrect MFA response entered
2626

27+
## Enable credential enumeration protection
28+
29+
Enumeration attacks are where an attacker tries to verify if an account exists using your credentials. One of the ways an attacker knows you have an account or not, is if they enter credenitals (e.g. email or phone number) and the screen either progresses to a password/code entry screen, or shows a message that the account does not exist.
30+
31+
Once an attacker knows an account exists, they can go about breaking in. To prevent them ever knowing, you can ensure that the sign in experience does not give the answer away.
32+
33+
1. In Kinde, go to **Settings > Attack protection**.
34+
2. Select **Enumeration protection**.
35+
3. Switch on the toggle for **Credential enumeration protection**.
36+
4. Select **Save**.
37+
2738
For general information about Kinde security, practices, and policies, see the [Trust Center](/trust-center/security/security-at-kinde/).

0 commit comments

Comments
 (0)