Authentication
Password policies
Objective The objective of this document is to reflect the measures and configurations implemented to comply with the password policy established by Fluid Attacks. These measures are intended to ensure the strength and protection of passwords used in ...
Authentication for Fluid Attacks staff
Centralized authentication We use a centralized authentication platform (IAM) to manage all our internal applications. Our talent do not know any of the passwords of the managed applications; they only know their own IAM passphrases. Once they log in ...
Authentication for clients
Our platform only uses SSO with Bitbucket, Google and Microsoft Accounts. Oauth2 protocol is used, which is an industry-standard authorization framework known for its robust security. The Oauth2 protocol only accepts login attempts from trusted URLs ...