FedRAMP Security Admin Guide
This guide provides comprehensive information on securely managing top-level administrative accounts in Descope's customer-facing applications. It covers administrative role definitions, account lifecycle procedures, and security settings to help organizations maintain FedRAMP compliance and follow secure configuration best practices.
This guide focuses on customer-facing application administrative accounts (Descopers and Tenant Admins) and does not cover internal backend administration required for Descope's infrastructure operations.
FedRAMP Compliance Considerations
Descope supports FedRAMP security requirements through the following capabilities:
- Access Control: Role-based access control with least-privilege enforcement
- Multi-Factor Authentication: Support for FIDO2/WebAuthn, TOTP, and SMS OTP
- Audit Logging: Comprehensive logging of all authentication and administrative events
- Session Management: Configurable session timeouts and inactivity detection
- Data Residency: Region-specific data storage (US, EU, AU)
- Encryption: TLS 1.2+ for data in transit; AES-256 for data at rest
- Secure Configuration: Extensive security settings with secure defaults
Administrative Account Role Definitions
Descope provides hierarchical administrative roles with distinct permissions and operational capabilities. Understanding these roles is critical for implementing least-privilege access control.
Company-Level Administrative Roles
Company-level roles apply across all projects within a Descope company and provide varying levels of administrative access.
Company Admin
Privilege Level: Highest administrative privilege across the entire company
Permissions and Actions:
- Full read/write access to all company settings
- Full read/write access to all projects within the company
- Manage all Descopers (create, modify, delete administrative users)
- Create and manage management keys with any permission level
- Configure company-wide SSO settings
- Enforce MFA requirements for all Descopers
- Configure SCIM provisioning for company access
- Access and modify all project configurations
- Manage project creation, cloning, export, and deletion
- View and manage all tenants across all projects
- Full access to audit logs across all projects
Security Impact: Company Admins have unrestricted access to all resources and configurations. This role should be assigned only to senior administrators who require full organizational control.
Recommended Assignment: Limit to 2-3 trusted senior administrators per organization.
Project Admin
Privilege Level: Full administrative access to assigned projects
Permissions and Actions:
- Full read/write access to assigned project(s) settings
- Configure authentication methods and flows
- Manage users, tenants, and access keys within assigned projects
- Configure authorization (roles, permissions, RBAC, FGA)
- Manage connectors and integrations
- Configure SSO applications and identity federation
- Manage project-level security settings
- Access audit logs for assigned projects
- Cannot access company-level settings
- Cannot manage Descopers or management keys
Security Impact: Project Admins have full control over project resources but are isolated from company-wide settings and other projects.
Recommended Assignment: Assign to project leads and senior engineers responsible for specific applications.
Project Developer
Privilege Level: Read/write access to project configurations, excluding sensitive settings
Permissions and Actions:
- Read/write access to authentication methods and flows
- Read/write access to authorization configurations
- Read/write access to connectors and integrations
- Manage users, tenants, and access keys
- View and modify project settings (excluding company-level settings)
- Access audit logs for assigned projects
- Cannot manage Descopers or company settings
- Cannot manage management keys
- Cannot delete projects or modify critical security settings
Security Impact: Developers can configure application behavior but cannot access company-wide administrative functions.
Recommended Assignment: Assign to development team members who need to configure authentication and authorization.
Project Support
Privilege Level: Read-only access to most configurations, read/write access to user management
Permissions and Actions:
- Read-only access to authentication methods, flows, connectors, IdP apps, authorization, and project settings
- Full read/write access to users, access keys, tenants, and audit logs
- Can assist users with account issues and password resets
- Can create and manage test users
- Cannot modify authentication methods, flows, or security configurations
- Cannot access company-level settings
Security Impact: Support personnel can assist users without the ability to modify security-critical configurations.
Recommended Assignment: Assign to customer support team members who need to help users with account issues.
Tenant-Level Administrative Roles
Tenant-level roles provide administrative capabilities scoped to specific tenants (multi-tenant applications).
Tenant Admin
Privilege Level: Full administrative access within a specific tenant
Permissions and Actions:
- Full user management within the tenant (create, modify, delete users)
- Assign roles and permissions to tenant users
- Configure tenant-specific SSO settings (with SSO Admin permission)
- Manage tenant-level roles and permissions
- Generate and manage access keys for tenant users (with appropriate permissions)
- Access tenant-specific audit logs
- Configure tenant profile and settings
- Impersonate users within the tenant (with Impersonate permission)
- Cannot access other tenants or project-level settings
Required Permissions:
- User Admin: Required for reading and modifying user data within the tenant
- SSO Admin: Required for reading and modifying tenant SSO configurations
- Impersonate: Required for acting on behalf of another user in the tenant
Security Impact: Tenant Admins have full control over tenant resources but are isolated from other tenants and project-wide settings.
Recommended Assignment: Assign to customer organization administrators in B2B applications.
Management Keys and Service Accounts
Management keys provide programmatic access to Descope's Management APIs for automated operations.
Privilege Levels:
- Company-level management keys: Access to all projects and company settings
- Project-level management keys: Access to specific project resources
- Tenant-level management keys: Access to specific tenant resources
Available Roles for Management Keys:
- Full Management: Complete read/write access to management APIs
- User Management: User CRUD operations only
- Tenant Management: Tenant CRUD operations only
- Access Key Management: Access key CRUD operations only
- FGA Read/Write: Fine-grained authorization read/write operations
- Descoper Access (SCIM): SCIM provisioning for Descope console access
Security Impact: Management keys provide powerful programmatic access and should be treated as highly sensitive credentials.
Recommended Practices:
- Use the principle of least privilege when assigning management key roles
- Generate separate keys for different automation purposes
- Rotate management keys regularly (at least every 90 days)
- Store keys securely in secrets management systems (e.g., HashiCorp Vault, AWS Secrets Manager)
- Never commit management keys to version control
- Monitor management key usage through audit logs
Admin Account Lifecycle Procedures
This section describes procedures for securely managing administrative accounts throughout their lifecycle.
Initial Account Setup
Creating Company Admin Accounts
-
Account Creation:
- Navigate to Company Settings > Descopers
- Click "+ Descoper" to create a new administrative account
- Enter the administrator's email address
- Select "Full access" or configure granular permissions with "Company Admin" role
- Optionally send an invitation email
-
Initial Authentication:
- If invitation email is sent, the administrator receives an email with authentication instructions
- Administrator completes initial authentication using configured methods (email OTP, magic link, SSO, or passkey)
- If MFA is enforced (recommended), administrator must enroll in MFA during first login
-
Post-Setup Verification:
- Verify the account appears in the Descopers list with correct role assignment
- Test account access by logging into the Descope console
- Verify the administrator can access intended resources and configurations
Creating Project/Tenant Admin Accounts
-
Project Admin Creation:
- Navigate to Company Settings > Descopers
- Click "+ Descoper"
- Enter administrator's email address
- Select "Granular permissions"
- Choose specific projects or tags and assign "Admin", "Developer", or "Support" role
- Send invitation email
-
Tenant Admin Creation:
- Navigate to Users in the relevant project
- Click "+ User" to create a new user account
- Enter user details and select the appropriate tenant
- Navigate to the user's details and assign the "Tenant Admin" role for the tenant
- Alternatively, use the User Management Widget to allow existing Tenant Admins to create new admin accounts
-
Role Assignment Verification:
- Verify role assignment in the user's profile
- Test account access to ensure proper tenant isolation
- Verify the administrator cannot access resources outside their assigned scope
Multi-Factor Authentication (MFA) Requirements
MFA is a critical security control for all administrative accounts and should be enforced as a baseline security requirement.
Enforcing MFA for Company Administrators
-
Company-Wide MFA Enforcement:
- Navigate to Company Settings > Settings
- Under "Console Access", enable "Enforce MFA"
- Supported MFA methods:
- Passkeys (FIDO2/WebAuthn) - Strongest authentication method, recommended
- TOTP (Time-based One-Time Password) - Compatible with authenticator apps (Google Authenticator, Authy, etc.)
- OTP via SMS - Text message-based verification (less secure, use only if other methods unavailable)
-
Administrator MFA Enrollment:
- Upon next login after MFA enforcement, administrators are prompted to enroll in MFA
- Administrator selects preferred MFA method and completes enrollment
- Backup MFA methods should be configured for account recovery
-
MFA Verification:
- After enrollment, administrators must complete MFA verification on each login
- MFA is required for all administrative sessions
Enforcing MFA for End-User Administrators (Tenant Admins)
-
Project-Level MFA Configuration:
- MFA for tenant admins and end users is configured through Descope Flows
- Navigate to Flows
- Edit the relevant authentication flow (e.g., "sign-up-or-in")
- Add MFA steps to the flow:
- TOTP enrollment and verification
- OTP via SMS enrollment and verification
- Passkey enrollment and verification (recommended)
-
Conditional MFA Based on Role:
- Use flow conditions to enforce MFA only for users with administrative roles
- Example condition: Check if user has "Tenant Admin" role, then require MFA
- This allows flexible MFA policies based on risk level
-
Step-Up Authentication:
- For highly sensitive operations, implement step-up authentication
- Configure step-up flows that require re-authentication with MFA
- Use step-up tokens with short expiration times (5-15 minutes)
MFA Backup and Recovery
-
Backup Authentication Methods:
- Administrators should enroll in multiple MFA methods
- Store backup codes securely for emergency access
- Document MFA recovery procedures for locked-out administrators
-
MFA Reset Procedures:
- Company Admins can reset MFA for Descopers through the Descope console
- For Tenant Admins, Project Admins can reset MFA through user management
- MFA resets should be logged and monitored for security incidents
Account Configuration Best Practices
Strong Authentication Configuration
-
Disable Weak Authentication Methods:
- For administrative accounts, disable password-based authentication in favor of:
- Passkeys (FIDO2/WebAuthn) - Hardware security keys or platform authenticators
- SSO with enterprise identity provider
- Magic links with email verification
- If passwords must be used, enforce strong password policies through flow configurations
- For administrative accounts, disable password-based authentication in favor of:
-
Configure Session Timeouts:
- Navigate to Project Settings > Session Management
- Configure appropriate session token timeouts:
- Session Token Timeout: 15-60 minutes for administrative sessions
- Refresh Token Timeout: 1-7 days depending on security requirements
- Enable Session Inactivity detection:
- Set inactivity timeout to 15-30 minutes for administrative accounts
- Idle sessions will automatically expire to prevent unauthorized access
-
Enable Refresh Token Rotation:
- Navigate to Project Settings > Session Management
- Enable "Refresh Token Rotation" for enhanced security
- Each session refresh generates a new refresh token, invalidating the previous one
- Helps detect and prevent token theft
Audit Logging Configuration
-
Enable Comprehensive Audit Logging:
- All administrative actions are automatically logged in Descope
- Access audit logs at Audit
- Audit logs include:
- User authentication events (login, logout, MFA)
- Administrative actions (user creation, role changes, configuration updates)
- API calls via management keys
- SSO configuration changes
- Access key generation and usage
-
Audit Log Monitoring:
- Regularly review audit logs for suspicious activity
- Use the Audit Widget to provide tenant admins with visibility into tenant-specific events
- Export audit logs for integration with SIEM systems
- Set up alerts for critical administrative actions
-
Audit Log Retention:
- Descope retains audit logs according to your subscription plan
- For compliance requirements, export and archive logs regularly
- Maintain logs for at least 90 days (recommended: 1 year for administrative actions)
Account Modification and Access Reviews
Regular Access Reviews
-
Quarterly Access Review Process:
- Review all Descoper accounts every 90 days
- Navigate to Company Settings > Descopers
- Verify each administrator still requires their assigned role
- Remove access for administrators who no longer need it
- Document access review outcomes
-
Tenant Admin Access Review:
- Review Tenant Admin assignments quarterly
- Use the Role Management Widget or Users page to review role assignments
- Verify tenant admins are assigned to correct tenants
- Remove unnecessary administrative privileges
-
Management Key Review:
- Review all management keys every 90 days
- Navigate to Company Settings > Management Keys
- Verify each key is still needed and being used
- Rotate or delete unused management keys
- Verify keys follow least-privilege principle
Role and Permission Changes
-
Modifying Descoper Roles:
- Navigate to Company Settings > Descopers
- Click the menu (three dots) next to the Descoper's name
- Select "Edit" to modify permissions
- Change between "Full access" and "Granular permissions"
- Update project/tag assignments and roles
- Save changes
-
Modifying Tenant Admin Roles:
- Navigate to Users
- Search for and select the user
- In the user details, navigate to the "Roles" section
- Add or remove the "Tenant Admin" role or associated permissions
- Changes take effect immediately for new sessions
-
Change Documentation:
- Document all role and permission changes
- Record justification for privilege changes
- Use audit logs to track who made changes and when
Account Decommissioning
Proper account decommissioning is critical to prevent unauthorized access after an administrator leaves the organization or changes roles.
Descoper Account Decommissioning
-
Immediate Deactivation:
- Upon administrator departure or role change, immediately disable account access
- Navigate to Company Settings > Descopers
- Click the menu (three dots) next to the Descoper's name
- Select "Delete" to remove the Descoper account
- Descoper is immediately logged out and cannot access the console
-
Session Invalidation:
- Deletion of a Descoper account immediately invalidates all active sessions
- The administrator is logged out of the Descope console
- All associated access tokens are revoked
-
Management Key Rotation:
- If the departing administrator had access to management keys, rotate those keys immediately
- Navigate to Company Settings > Management Keys
- Delete compromised keys
- Generate new keys and update applications that use them
- Verify no orphaned keys remain
Tenant Admin Account Decommissioning
-
Remove Tenant Admin Role:
- Navigate to Users
- Search for and select the user
- Remove the "Tenant Admin" role and associated permissions (SSO Admin, User Admin, Impersonate)
- Alternatively, use the User Management Widget for tenant-scoped admin removal
-
Optional: Full User Account Deletion:
- If the user no longer needs any access to the application, delete the user account
- In the user details, click the menu (three dots)
- Select "Delete User"
- User is immediately logged out and cannot access the application
-
Access Key Revocation:
- If the user had generated any access keys (M2M tokens), revoke them
- Navigate to Access Keys
- Search for keys associated with the user
- Deactivate or delete the access keys
Post-Decommissioning Verification
-
Verify Account Removal:
- Confirm the account no longer appears in the Descopers list (for Descopers)
- Confirm the user no longer has administrative roles (for Tenant Admins)
- Attempt to log in with the decommissioned account to verify access is denied
-
Audit Log Review:
- Review audit logs to confirm decommissioning actions were completed
- Document decommissioning date and administrator who performed the action
- Verify no suspicious activity occurred during the administrator's final sessions
-
Resource Handoff:
- If the administrator managed specific resources (flows, connectors, etc.), reassign ownership
- Document any pending work or configurations the administrator was responsible for
- Update team documentation to reflect role changes
Security Settings Reference
This section provides a comprehensive reference of all administrative security settings, their functions, security impacts, and recommended values.
Company-Level Security Settings
These settings are configured at the company level and apply across all projects or to specific projects.
| Setting | Location | Function | Security Impact | Recommended Value |
|---|---|---|---|---|
| Configure SSO | Company Settings > Settings | Enables Single Sign-On (SSO) for Descope console access using SAML or OIDC identity provider | Centralizes authentication, enables enterprise identity governance, reduces password-related risks | Enabled with SAML or OIDC IdP for enterprise environments |
| Enforce SSO | Company Settings > Settings | Requires all Descopers to authenticate via SSO (disables email/password login) | Ensures all console access goes through enterprise IdP with centralized policies | Enabled after SSO configuration and testing |
| Enforce MFA | Company Settings > Settings | Requires all Descopers to use multi-factor authentication (Passkeys, TOTP, or SMS OTP) | Protects against credential theft and unauthorized access to administrative console | Enabled for all environments (supports Passkeys, TOTP, SMS) |
| SSO Role Mapping | Company Settings > Settings | Maps SSO groups to Descope Descoper roles (Company Admin, Project Admin, Developer, Support) | Automates role assignment based on IdP group membership, enforces consistent access control | Configure granular permissions mapping SSO groups to appropriate roles |
| SCIM Provisioning | Company Settings > Settings + Management Keys | Enables automated user provisioning/deprovisioning via SCIM protocol from IdP | Automates Descoper lifecycle management, ensures timely access removal | Enabled with SCIM bearer token and IdP integration for enterprise environments |
| Management Key Roles | Company Settings > Management Keys | Defines permission scope for programmatic API access (Full Management, User Management, etc.) | Controls programmatic access to sensitive operations, enables least-privilege automation | Use specific roles (User Management, Tenant Management) instead of Full Management when possible |
| Allow Developer Success Access | Company Settings > Settings | Permits Descope support team to access project data for troubleshooting | Enables enhanced support but grants Descope personnel access to project data | Disabled by default; enable only when troubleshooting with Descope support, disable after resolution |
Project-Level Security Settings
These settings are configured per project and control security behavior for end users and tenant administrators.
| Setting | Location | Function | Security Impact | Recommended Value |
|---|---|---|---|---|
| Approved Domains | Project Settings > General > Security | Whitelist of domains allowed for redirect and verification URLs | Prevents open redirect vulnerabilities and unauthorized callbacks | Always configure; list only trusted application domains; never leave empty |
| Federated App Access | Project Settings > General > Security | Defines default access to federated applications for new users | Controls automatic application access provisioning | Require explicit approval for new users (disabled by default) |
| JWK Rotation | Project Settings > General > Security | Manages signing keys used for JWT verification | Regularly rotating keys limits impact of key compromise | Rotate keys at least every 90 days; maintain 2 active keys during rotation |
| Block Self-Registration Sign Up | Project Settings > General > Sign Ups | Prevents new users from self-registering; requires invitation or SSO | Restricts user base to invited or SSO-provisioned users | Enabled for B2B applications or where user registration should be controlled |
| Session Token Timeout | Project Settings > Session Management | Expiration time for session tokens (access to application resources) | Shorter timeouts reduce risk of stolen token abuse; longer timeouts improve UX | 15-60 minutes for admin sessions; 60-120 minutes for standard users |
| Refresh Token Timeout | Project Settings > Session Management | Expiration time for refresh tokens (ability to obtain new session tokens) | Shorter timeouts force re-authentication; longer timeouts improve UX | 1-7 days for admin sessions; 7-30 days for standard users |
| Refresh Token Rotation | Project Settings > Session Management | Generates new refresh token on each use, invalidating previous token | Detects token theft (reuse of old token indicates compromise) | Enabled for all environments |
| Session Inactivity Timeout | Project Settings > Session Management | Automatically expires sessions after specified period of inactivity | Prevents unauthorized access to abandoned sessions | Enabled with 15-30 minute timeout for admin sessions |
| Token Response Methods | Project Settings > Session Management | Determines how tokens are delivered (cookies vs. response body) | Cookies with HttpOnly/Secure flags provide better security than localStorage | Cookies for web applications; response body only for mobile/native apps |
| Access Key Expiration | Project Settings > Session Management | Expiration time for M2M access key session tokens | Shorter expiration reduces risk of compromised service account tokens | 1-30 days depending on use case; use shorter durations for high-privilege keys |
Authorization and Role-Based Access Control (RBAC) Settings
These settings control user roles, permissions, and tenant-based access.
| Setting | Location | Function | Security Impact | Recommended Value |
|---|---|---|---|---|
| Project-Level Roles | Authorization > RBAC | Defines roles available across all tenants in the project | Establishes consistent permission structure for application-wide access | Define roles based on job functions; avoid overly broad permissions |
| Tenant-Level Roles | Tenants > {Tenant} > Authorization | Defines roles specific to individual tenants | Enables tenant-specific access control and multi-tenancy isolation | Create tenant-specific roles for B2B use cases where customers need custom access controls |
| Default Roles | Authorization > RBAC or Tenants > {Tenant} > Authorization | Automatically assigns specified roles to new users | Provides baseline permissions for new users | Assign least-privilege default role; require explicit assignment for elevated privileges |
| Hidden Roles | Authorization > RBAC or Tenants > {Tenant} > Authorization | Hides roles from Tenant Admins in admin widgets and SSO attribute mapping | Prevents tenant admins from assigning sensitive system roles | Mark system/internal roles as hidden to prevent unauthorized assignment |
| Tenant Admin Permissions | Authorization > RBAC | Grants "User Admin", "SSO Admin", and "Impersonate" permissions to Tenant Admin role | Controls tenant admin capabilities for user management, SSO config, and impersonation | Assign only necessary permissions; consider separate roles for SSO Admin vs User Admin |
| Permission Definitions | Authorization > RBAC | Defines granular permissions that can be assigned to roles | Enables fine-grained access control within application | Define permissions based on specific actions/resources; avoid catch-all permissions |
Authentication Method Security Settings
These settings control which authentication methods are available and their security configurations.
| Setting | Location | Function | Security Impact | Recommended Value |
|---|---|---|---|---|
| Passkey Authentication | Authentication Methods > Passkeys | Enables FIDO2/WebAuthn passkey authentication | Strongest phishing-resistant authentication method; eliminates passwords | Enabled and promoted as primary authentication method for admin accounts |
| Magic Link Authentication | Authentication Methods > Magic Link | Enables email-based passwordless authentication | Secure if email is protected; vulnerable to email compromise | Acceptable for standard users; consider requiring MFA for admin accounts |
| OTP Authentication | Authentication Methods > OTP | Enables one-time password via email or SMS | Security depends on email/SMS security; SMS vulnerable to SIM swap attacks | Acceptable with email; SMS should be backup option only |
| Password Authentication | Authentication Methods > Password | Enables traditional username/password authentication | Weakest authentication method; vulnerable to phishing, credential stuffing | Disabled for admin accounts; if required, enforce strong password policy and MFA |
| SSO Authentication | Authentication Methods > SSO | Enables enterprise SSO (SAML/OIDC) authentication | Delegates authentication to enterprise IdP with centralized policies | Enabled for B2B applications; enforce IdP-level MFA |
| Social Login | Authentication Methods > Social | Enables OAuth login with social providers (Google, Microsoft, etc.) | Security depends on social provider; may not meet enterprise security requirements | Avoid for admin accounts; acceptable for standard users in B2C applications |
Rate Limiting and Abuse Prevention Settings
These settings protect against brute force attacks and API abuse.
| Setting | Location | Function | Security Impact | Recommended Value |
|---|---|---|---|---|
| Authentication Rate Limiting | Project Settings > Rate Limiting or configured via flows | Limits authentication attempts per user/IP address | Prevents brute force credential attacks and account enumeration | Enabled; 5-10 attempts per 15 minutes per user; stricter limits for admin accounts |
| API Rate Limiting | Configured via Descope service (contact support for custom limits) | Limits API requests to prevent abuse and DDoS | Protects service availability and prevents resource exhaustion | Default limits are appropriate for most use cases; increase only if legitimate traffic requires it |
| User Enumeration Prevention | Security Best Practices > Preventing User Enumeration | Returns consistent messages whether user exists or not | Prevents attackers from discovering valid user accounts | Enabled by default; do not customize authentication flows to reveal user existence |
Data Protection and Privacy Settings
These settings control data handling, encryption, and privacy.
| Setting | Location | Function | Security Impact | Recommended Value |
|---|---|---|---|---|
| Data Residency Region | Project Settings > General (set at project creation) | Determines geographic location of data storage (US, EU, AU) | Ensures compliance with data residency regulations (GDPR, etc.) | Select region based on regulatory requirements; cannot be changed after project creation |
| Custom Domain | Project Settings > General | Uses custom domain instead of api.descope.com for API endpoints | Improves brand consistency and may be required for security policies | Configure custom domain with valid SSL/TLS certificate |
| Encryption in Transit | Automatically enforced | All API communication uses TLS 1.2+ | Protects data from interception during transmission | Always enforced; ensure applications do not disable certificate verification |
| Encryption at Rest | Automatically enforced | All stored data is encrypted using industry-standard encryption | Protects data from unauthorized access if storage is compromised | Always enforced; no configuration required |
| PII Handling | Configurable via user attributes and JWT templates | Controls what personally identifiable information is stored and included in JWTs | Minimizes exposure of sensitive user data | Store only necessary PII; avoid including sensitive data in JWT claims |
Audit and Monitoring Settings
These settings control logging, monitoring, and visibility into system activity.
| Setting | Location | Function | Security Impact | Recommended Value |
|---|---|---|---|---|
| Audit Log Retention | Automatic based on subscription plan | Retains logs of all authentication and administrative events | Enables security monitoring, incident investigation, and compliance reporting | Export and archive logs for extended retention (90+ days recommended for admin actions) |
| Audit Log Access | Audit | Controls who can view audit logs | Audit logs contain sensitive information about system activity | Limit access to security personnel and senior administrators |
| Custom Audit Events | Implemented via SDK | Allows logging of application-specific events to Descope audit trail | Provides comprehensive audit trail including application logic | Log all administrative actions and security-relevant events |
| Webhook Notifications | Connectors > Webhooks | Sends real-time notifications of authentication and administrative events | Enables real-time security monitoring and SIEM integration | Configure webhooks to send critical events to SIEM or alerting system |
Advanced Security Settings
These settings provide additional security controls for specific use cases.
| Setting | Location | Function | Security Impact | Recommended Value |
|---|---|---|---|---|
| Step-Up Authentication | Implemented via flows | Requires re-authentication for sensitive operations | Protects high-risk actions even if session is compromised | Enable for admin operations, financial transactions, and sensitive data access |
| Trusted Device Tokens | Project Settings > Session Management | Remembers trusted devices to reduce MFA prompts | Improves UX but may weaken security if device is compromised | Disable for admin accounts; acceptable for standard users with short expiration (7-30 days) |
| Content Security Policy | Security Best Practices > CSP | Configures CSP headers for Descope-hosted flows | Protects against XSS attacks in authentication flows | Configure restrictive CSP policy for hosted flows |
| Firewall/ACL | Security Best Practices > Firewall ACL | Restricts API access to specific IP ranges | Prevents access from unauthorized networks | Configure IP allowlist for admin access to management APIs |
| External Token Validation | Project Settings > External Token | Validates tokens issued by external identity providers | Enables federation with external identity systems | Configure only if integrating with external token issuers; validate signatures and claims |
Additional Resources
For more information on security features and best practices in Descope, refer to the following documentation:
- Company Settings - Managing Descopers and company-level configuration
- Role-Based Access Control - Configuring roles and permissions
- Admin Widgets - Implementing user, role, and audit management for tenant admins
- Session Management - Configuring session tokens and authentication
- Security Best Practices - Additional security hardening guidance (see links throughout this document)
- Rate Limiting - Configuring rate limits to prevent abuse
- Project Settings - Configuring project-level security settings
- FedRAMP Recommended Secure Configuration - Official FedRAMP guidance