Fraud Connectors
Fraud Connectors in Descope enable you to integrate with third-party fraud detection and risk assessment services to protect your authentication flows from bots, malicious activity, and fraudulent access attempts. Unlike analytics connectors that stream data, Fraud Connectors are used as steps within your Flows to evaluate user risk and make real-time security decisions during authentication.
How Fraud Connectors Work
Fraud Connectors are added as steps within your Descope flows to evaluate user risk at various points in the authentication journey. When a connector step is executed, it:
- Collects relevant data about the user, device, or session
- Sends the data to the third-party fraud detection service
- Receives risk assessments, scores, or detection signals
- Makes the results available in your flow for conditional logic
You can use the connector's risk signals to implement conditional branching in your flows, such as:
- Requiring additional authentication steps for high-risk users
- Blocking suspicious signups automatically
- Allowing low-risk users to proceed with reduced friction
- Triggering step-up authentication based on risk scores
Note
Most fraud connector steps must be added after at least one Screen or Action component in your flow, as they typically run in the browser and require user interaction or context.
Fraud Connectors complement Descope's built-in risk signals which include bot detection, impossible travel detection, and risk scoring.
For more information on using built-in risk signals and how to combine them with fraud connectors, see our Fingerprinting Doc.
Available Fraud Connectors
Descope supports Fraud Connectors for various fraud detection and risk assessment platforms. Each connector is configured through the Connectors page in the Descope Console.