At any given moment, up to 30% of the world’s internet traffic is flowing through Akamai services. This provides Akamai with an abundance of information about user activity and a deep insight that is foundational to Akamai’s Cloud Security Intelligence. Hosted Login can leverage this intelligence to better protect your user authentication with a tool called Client Reputation.
With Client Reputation, user IP addresses have a set of risk scores associated with them based on observed behavior. There are four (4) categories of risk scores:
|Category||Description of risk behavior|
||A web client or botnet that uses automated tools to launch volumetric Denial of Service (DoS) attacks.|
||Scanning tool that probes web apps for vulnerabilities during an attack’s reconnaissance phase.|
||Web attack that targets websites and web apps with techniques like SQL injection, remote file inclusion, or cross-site scripting.|
||Web scraper that crawls sites and collects data like hotel rates, product prices, store locations, and more.|
Each of these categories is given a score from 1 to 10. Generally speaking, this score can be interpreted as follows:
|Risk Score||General interpretation|
|1-4||Low risk of this behavior, no need to worry|
|5-7||Medium risk of this behavior, good to monitor|
|8-10||High risk of this behavior, recommended to take action|
You can learn more about Client Reputation here.
With Hosted Login, you can take action against risky clients by stepping up the level of authentication required for a user based on their Client Reputation score(s).
DOSATCKscore of 9, so it prompts them to complete the 2FA process.
DOSATCKscore of 2, they’re immediately authenticated.
For each Client Reputation category you’d like to assess upon login, complete the following steps:
Note that you need only add the settings for the Client Reputation values you care about. For example, web scrapers can be used for benign purposes, and if your site has no history of problems with such tools, you may choose not to set a threshold for this.
Currently, when any of the configured thresholds are met, Hosted Login will prompt the user to complete the 2FA process. In the future, you will be able to configure alternative actions for Hosted Login to take. This guide will be updated as additional options become available.