- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`This authentication endpoint lacks metadata to effectively detect Account Takeover Attacks (ATO) attempts by App & API Protection.
An account takeover occurs when an attacker gains access to a user’s account credentials and assumes control of the account. Datadog can detect and protect against common strategies implemented by attackers, such as Credential Stuffing or Brute Forcing. For more information on this works, see ASM account takeover protection.
For Datadog’s ATO detection to work properly, the library has to compute fingerprints based on the user’s original request. That means access to the IP of the user and every header from the original request. We detect improper header or IP propagation through the absence of common headers (User-Agent
& Accept-Encoding
) and by checking whether the request originates from a private IP (which may ocurr if the real IP address is not propagated with the X-Forwarded-For
header).
Two options are available:
X-Forwarded-For