Learn how to protect your API from threats with TypeAuth’s security features including rate limiting, disposable email detection, and advanced anomaly detection tools.
TypeAuth provides robust security features to protect your application from various types of fraud and abuse. This comprehensive suite of tools helps maintain the integrity of your authentication system and safeguard your users.
GeoSentry protects your API endpoints by monitoring and detecting suspicious geographic access patterns. It tracks physical locations where authentication tokens are used to identify potentially compromised credentials when they’re used from impossible locations in unrealistic timeframes.
For example: If a token is used in London and then 30 minutes later in Buenos Aires, GeoSentry recognizes this physically impossible travel time and can block the request, require verification, or alert your security team - preventing unauthorized access even if the attacker has valid credentials.
Permissive: Best for global content delivery networks (CDNs) or public APIs where users frequently travel internationally and blocking access would significantly impact service availability.
Standard: Ideal for typical business applications, SaaS platforms, or e-commerce sites that need balanced security without overly restricting legitimate global users.
Strict: Perfect for financial services, healthcare applications, or government systems where security is paramount and any suspicious geographic patterns must be blocked immediately.
Regional: Designed for services that should only operate within specific geographic boundaries due to regulatory requirements (like gambling sites) or business operations limited to certain countries/regions.
TypeAuth’s Anomaly Detection system is an advanced security feature that monitors API behavior patterns to identify potential threats and unusual activities. It analyzes various metrics like request volumes, error rates, response times, payload sizes, and endpoint velocity to detect deviations from normal patterns.
For example: If your API typically handles 100 requests per minute and suddenly receives 1,000 requests, or if response times suddenly spike from 200ms to 2 seconds, the system will flag these anomalies and take configured actions based on your profile - from simple monitoring to blocking requests.
Permissive: Best for development environments or public APIs where monitoring anomalies is needed but blocking actions could disrupt service availability (uses higher deviation thresholds and only monitors).
Standard: Ideal for most production applications needing balanced protection - alerts on moderate anomalies and can challenge suspicious users without immediately blocking them.
Strict: Perfect for financial or healthcare applications requiring maximum security - uses stricter thresholds and immediately blocks suspicious activities.
API Gateway: Optimized for high-traffic API gateways with very short monitoring windows (1-15 minutes) and specialized thresholds for different types of anomalies.