Skip to main content

Security Best Practices

Recommendations for securing your LumoAuth deployment and applications.


Authentication

PracticeWhy
Enable MFARequire or encourage MFA for all users
Use Adaptive MFAAutomatically challenge high-risk logins
Enforce strong passwordsMinimum 12 characters, complexity, breach detection
Offer passkeysPhishing-resistant, most secure option
Use PKCERequired for public clients (SPAs, mobile)
Implement DPoPBind tokens to client keys to prevent theft

Token Management

PracticeWhy
Short access token lifetimesLimit exposure window (1 hour or less)
Use refresh token rotationIssue new refresh token on each use
Validate tokens server-sideVerify signatures and claims in your backend
Check audience claimsEnsure tokens are meant for your application
Revoke tokens on logoutDon't rely only on expiration
Use HTTPS onlyNever transmit tokens over plain HTTP

Application Configuration

PracticeWhy
Restrict redirect URIsUse exact match, avoid wildcards
Limit scopesRequest only needed scopes
Rotate client secretsPeriodically rotate confidential client secrets
Use confidential clientsPrefer server-side apps that can keep secrets
Validate state parameterPrevent CSRF on authorization callbacks

Access Control

PracticeWhy
Principle of least privilegeGrant minimum permissions needed
Regular access reviewsAudit role assignments quarterly
Use groups for role assignmentEasier to manage and audit
Test access policiesUse the Permission Tester before deploying
Separate admin rolesDon't give everyone full admin access

Tenant Security

PracticeWhy
Use custom domainsProfessional appearance, branded URLs
Rotate signing keysPeriodic key rotation limits compromise window
Enable audit loggingTrack all authentication and admin events
Configure webhooksReal-time alerts for security events
Review audit logsRegular review of suspicious activity

Monitoring

PracticeWhy
Monitor failed loginsDetect brute force and credential stuffing
Alert on anomaliesUnusual login patterns may indicate compromise
Track high-risk eventsAct on impossible travel and risk score alerts
Export logs to SIEMCentralized security monitoring
Set up incident responseDefine playbook for security events

Deployment Checklist

  • TLS enabled for all endpoints
  • Strong password policy configured
  • MFA enabled (required or adaptive)
  • Brute force protection active
  • Rate limiting configured
  • Signing keys rotated from defaults
  • Audit logging enabled
  • Webhook alerts for security events
  • Access control policies reviewed
  • Client applications use PKCE
  • Redirect URIs restricted to exact matches
  • Custom domain configured
  • Monitoring and alerting active