FI Finnish
SE Swedish
FR French
PL Polish
DE German
US English (US)

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

English (US)
FI Finnish
SE Swedish
FR French
PL Polish
DE German
US English (US)
  • Log in
  • Home
  • Identity Governance and Administration (IGA)
  • IGA solution library
  • Instructions & guidelines
  • Configure authentication

How to Enable Brute Force Detection to ESA

Learn how to configure and secure your ESA from brute force attacks.

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Service Management
    Matrix42 Professional Solution Matrix42 Core Solution Enterprise Service Management Matrix42 Intelligence
  • Identity Governance and Administration (IGA)
    IGA overview IGA solution library
  • Platform
    ESM ESS2 ESS Efecte Chat for Service Management Integrations Add-ons
  • Release Notes for M42 Professional, IGA, Conversational AI
    2026.1 2025.3 2025.2 2025.1 2024.2 2024.1 2023.4 2023.3 2023.2 2023.1 2022.4 2022.3 Release Information and Policies
  • Other Material
    Terms & Documentation Guidelines Accessibility Statements
  • Services
+ More
    • Service Management

    • Identity Governance and Administration (IGA)

    • Platform

    • Release Notes for M42 Professional, IGA, Conversational AI

    • Other Material

    • Services

How to Enable Brute Force Detection to ESA

Learn how to configure and secure your ESA from brute force attacks.

A brute force attack attempts to guess a user’s password by trying to login multiple times. ESA has brute force detection capabilities and can temporarily disable a user account if the number of login failures exceeds a specified threshold.

By enabling the Brute Force detection in ESA, we can temporarily block the attackers trying to break into the system by disabling the users temporarily. When a user is temporarily locked and attempts to log in, ESA displays the default Invalid username or password error message. This message is the same error message as the message displayed for an invalid username or invalid password to ensure the attacker is unaware the account is disabled. 

Delete

Note!

Starting from 2023 Q2 Brute Force Detection is Enabled by default. 


Step-by-Step instructions

  1. Login with ESA Admin (main.admin) to URL domain.com/auth/admin 

  2. Open Realm Settings from the left side panel 

  3. Click the Security Defenses tab

  4. Click the Brute Force Detection tab

  5. Enable Brute force detection and check the settings


ESA can deploy permanent lockout and temporary lockout actions when it detects an attack. Permanent lockout disabled a user account until an administrator re-enables it. Temporary lockout disabled a user user account for a specific period of time. The time period that the account is disabled increases as the attack continues.


Common Parameters

Name Description Default

Max Login Failures

The maximum number of login failures.

30 failures.

Quick Login Check Milliseconds

The minimum time between login attempts.

1000 milliseconds.

Minimum Quick Login Wait

The minimum time the user is disabled when login attempts are quicker than Quick Login Check Milliseconds.

1 min



brute force esa setup

Was this article helpful?

Yes
No
Give feedback about this article

Table of Contents

Related Articles

  • Configure: User Federation for Authentication
  • Configure: ESA SAML Authentication
  • Configure: OTP Using external application
  • Configure: ESA - Guest Access configuration
  • Configure: Whistleblower Access configuration

Copyright 2026 – Matrix42 Professional.

Matrix42 homepage


Knowledge Base Software powered by Helpjuice

0
0
Expand