Overview
Find affected sessions, revoke tokens, and enforce resets.
Prerequisites
None.
Permissions required
Steps (4)
-
1
Locate impacted accounts
Security → Events: filter by IP/UA indicators; export list.
Tips
—
Validation
—
Success criteria
—
-
2
Revoke sessions
Open Sessions → “Revoke all” per user. Enable “revoke on refresh reuse”.
Tips
—
Validation
—
Success criteria
- All tokens invalid; attempts require re-auth.
-
3
Require password reset & MFA
Flag accounts for password reset on next login; enforce MFA required.
Tips
—
Validation
—
Success criteria
—
-
4
Post-incident review
Download audit logs; document timeline and indicators of compromise.
Tips
—
Validation
—
Success criteria
—
About this guide
AccessGuard secures apps and external sites with hosted authentication and short-lived JWTs. Enable MFA, define RBAC permissions, and connect enterprise identity via SAML or OIDC. A lightweight HMAC bridge lets you embed login, registration, and token refresh flows on any domain without CORS pain.
Admins manage users, sessions, connections, and policies from one console. Profiles consolidate verified emails/phones, consents, KYC docs, and risk flags. Events and metrics provide visibility for security and ops.
Designed for velocity and safety: opinionated defaults, least-privilege keys, Prometheus counters, and exportable audit logs.