None
.auth0-forwarded-for
header as a trusted source of the user’s IP address for brute-force protection. This setting will not be available for non-authenticated applications.auth0-forwarded-for
header that contains the value of the user’s IP address. Be sure that the IP address you provide really belongs to your user.
auth0-forwarded-for
(or, in general, data from applications) as sources for the user’s IP address can be risky. Because this header is easy to spoof and makes it possible to bypass attack protection validation, only do this if you know you can trust that header.auth0-forwarded-for
header:
auth0-forwarded-for
header is checked against the brute-force protection and suspicious IP throttling AllowLists.auth0-forwarded-for
header will only be accepted for authenticated calls with the Client Secret. If your application is not authenticated or is not configured to send the auth0-forwarded-for
header:
401 Unauthorized
status code and the following body: