Skip to main content

Security

LumoAuth is built with security as a core design principle. This section covers the security features, best practices, and protections built into the platform.


Security Features Overview

FeatureDescription
Adaptive MFARisk-based multi-factor authentication
Brute Force ProtectionAccount lockout after failed attempts
Impossible Travel DetectionFlag logins from geographically impossible locations
Rate LimitingProtect endpoints from abuse
Token SecurityDPoP, short-lived tokens, revocation
Session SecuritySecure cookies, fixation protection, idle timeout
CSRF ProtectionCross-site request forgery prevention
Password SecurityBreach detection, complexity requirements, hashing
Tenant IsolationComplete data separation between tenants
Audit LoggingComprehensive event trail
Signing Key RotationPeriodic cryptographic key rotation

Attack Protection

Brute Force

LumoAuth detects and blocks brute force attacks:

SettingDescriptionDefault
Max Failed AttemptsFailed logins before lockout5
Lockout DurationHow long the account is locked30 minutes
Progressive DelayIncreasing delay between attemptsEnabled
IP-Based BlockingBlock IPs with excessive failuresEnabled

When an account is locked:

  • The user receives an email notification
  • An audit log entry is created
  • A webhook event is fired (if configured)

Credential Stuffing

LumoAuth mitigates credential stuffing through:

  • Breached password detection (checks against known breach databases)
  • Rate limiting on login endpoints
  • Adaptive MFA that triggers on suspicious patterns
  • Anomaly detection for login patterns

Bot Protection

  • Rate limiting per IP address
  • CAPTCHA integration for suspect requests
  • Device fingerprinting for risk assessment

Password Security

FeatureDescription
Bcrypt HashingPasswords are hashed with bcrypt (cost factor 12+)
Breach DetectionPasswords checked against known breaches
Minimum LengthConfigurable minimum password length
Complexity RulesRequire uppercase, lowercase, numbers, symbols
HistoryPrevent reuse of recent passwords
Rotation RemindersOptional password age reminders

Token Security

FeatureDescription
Short-lived access tokensDefault 1-hour expiration
Refresh token rotationNew refresh token issued on each use
Token revocationImmediate revocation via API
DPoP bindingBind tokens to client cryptographic keys (RFC 9449)
JWT signingRSA or EC signing with key rotation
Audience restrictionTokens scoped to specific applications
RFC 9068 complianceJWT access tokens follow standard format

Network Security

FeatureDescription
TLS mandatoryAll endpoints require HTTPS
HSTSStrict Transport Security headers
Secure cookiesHttpOnly, Secure, SameSite flags
CORSConfigurable allowed origins per application
CSPContent Security Policy headers

Tenant Security

FeatureDescription
Data isolationAll queries scoped to current tenant
Separate signing keysEach tenant has independent signing keys
Independent auth configMFA, password policy, social login per tenant
Cross-tenant protectionAuthorization checks prevent cross-tenant access

Security Configuration

Configure security settings at:

SettingLocation
Password policy/t/{tenantSlug}/portal/configuration/auth-settings
MFA policy/t/{tenantSlug}/portal/configuration/auth-settings
Adaptive auth/t/{tenantSlug}/portal/configuration/adaptive-auth
Rate limiting/t/{tenantSlug}/portal/configuration/auth-settings
Signing keys/t/{tenantSlug}/portal/signing-keys

In This Section

GuideDescription
Rate LimitingAPI rate limiting and throttling
Security Best PracticesRecommendations for secure deployment