Passer au contenu principal
PATCH
/
attack-protection
/
suspicious-ip-throttling
TypeScript
import { ManagementClient } from "auth0";

async function main() {
    const client = new ManagementClient({
        token: "<token>",
    });
    await client.attackProtection.suspiciousIpThrottling.update({});
}
main();
{
  "enabled": true,
  "shields": [
    "block"
  ],
  "allowlist": [
    "127.0.0.1"
  ],
  "stage": {
    "pre-login": {
      "max_attempts": 100,
      "rate": 864000
    },
    "pre-user-registration": {
      "max_attempts": 50,
      "rate": 1728000
    }
  }
}

Autorisations

Authorization
string
header
requis

Bearer authentication header of the form Bearer <token>, where <token> is your auth token.

Corps

enabled
boolean

Whether or not suspicious IP throttling attack protections are active.

shields
enum<string>[]

Action to take when a suspicious IP throttling threshold is violated. Possible values: block, admin_notification.

Options disponibles:
block,
admin_notification
allowlist
(string<ipv4> | string<cidr> | string<ipv6> | string<ipv6_cidr>)[]

List of trusted IP addresses that will not have attack protection enforced against them.

stage
object

Holds per-stage configuration options (max_attempts and rate).

Réponse

Suspicious IP throttling configuration successfully updated.

enabled
boolean

Whether or not suspicious IP throttling attack protections are active.

shields
enum<string>[]

Action to take when a suspicious IP throttling threshold is violated. Possible values: block, admin_notification.

Options disponibles:
block,
admin_notification
allowlist
(string<ipv4> | string<cidr> | string<ipv6> | string<ipv6_cidr>)[]

List of trusted IP addresses that will not have attack protection enforced against them.

stage
object

Holds per-stage configuration options (max_attempts and rate).