Resource: auth0_attack_protection

Auth0 can detect attacks and stop malicious attempts to access your application such as blocking traffic from certain IPs and displaying CAPTCHAs.

Example Usage

resource "auth0_attack_protection" "my_protection" {
  suspicious_ip_throttling {
    enabled   = true
    shields   = ["admin_notification", "block"]
    allowlist = ["192.168.1.1"]

    pre_login {
      max_attempts = 100
      rate         = 864000
    }

    pre_user_registration {
      max_attempts = 50
      rate         = 1200
    }
  }

  brute_force_protection {
    allowlist    = ["127.0.0.1"]
    enabled      = true
    max_attempts = 5
    mode         = "count_per_identifier_and_ip"
    shields      = ["block", "user_notification"]
  }

  breached_password_detection {
    admin_notification_frequency = ["daily"]
    enabled                      = true
    method                       = "standard"
    shields                      = ["admin_notification", "block"]

    pre_user_registration {
      shields = ["block"]
    }
  }
}

Schema

Optional

Read-Only

Nested Schema for breached_password_detection

Required:

Optional:

Nested Schema for breached_password_detection.pre_user_registration

Optional:

Nested Schema for brute_force_protection

Required:

Optional:

Nested Schema for suspicious_ip_throttling

Required:

Optional:

Nested Schema for suspicious_ip_throttling.pre_login

Optional:

Nested Schema for suspicious_ip_throttling.pre_user_registration

Optional:

Import

Import is supported using the following syntax:

# As this is not a resource identifiable by an ID within the Auth0 Management API,
# attack_protection can be imported using a random string.
#
# We recommend [Version 4 UUID](https://www.uuidgenerator.net/version4)
#
# Example:
terraform import auth0_attack_protection.my_protection "24940d4b-4bd4-44e7-894e-f92e4de36a40"