Overview
Short-lived access tokens, refresh rotation, and forced logout.
Prerequisites
None.
Permissions required
Downloads & Templates
Steps (4)
-
1
Set TTLs
Settings → Security → Tokens. Set access_token = 15m; refresh_token = 30d (example).
Tips
—
Validation
—
Success criteria
—
-
2
Enable rotation
Enable refresh rotation and revoke on reuse; set idle/max session windows.
Tips
—
Validation
—
Success criteria
—
-
3
Instrument introspection
Use /auth/introspect from your gateway to validate tokens on critical APIs.
Tips
—
Validation
—
Success criteria
- Stale tokens rejected; reuse triggers revocation.
-
4
Force logout playbook
From Sessions, revoke all for a user or by IP/UA pattern following an incident.
Tips
—
Validation
—
Success criteria
—
About this guide
AccessGuard secures apps and external sites with hosted authentication and short-lived JWTs. Enable MFA, define RBAC permissions, and connect enterprise identity via SAML or OIDC. A lightweight HMAC bridge lets you embed login, registration, and token refresh flows on any domain without CORS pain.
Admins manage users, sessions, connections, and policies from one console. Profiles consolidate verified emails/phones, consents, KYC docs, and risk flags. Events and metrics provide visibility for security and ops.
Designed for velocity and safety: opinionated defaults, least-privilege keys, Prometheus counters, and exportable audit logs.