Authgear 標誌
安全性
攻擊防護
自適應 MFA
簡訊濫發防護
授權
驗證
身份驗證
社群登入
無密碼登入
WhatsApp OTP
通行密鑰
生物辨識
機器對機器權杖
使用者
使用者管理
自助設定
品牌
自訂外觀
整合
擴充性
產品
雲端版
(免費開始)
自建版
遷移至 Authgear
第一線員工身份
客戶身份管理
B2B SaaS 應用
企業 SSO
簡訊成本優化
部落格
客戶案例
產品比較
登入畫廊
名詞解釋
文件
GitHub
最新動態
  • 定價
登入
註冊
預約示範
註冊/登入

Security & Compliance

Security

Security Assessments and Compliance

At Authgear, we take data security extremely seriously, being both ISO 27001 and SOC 2 Type II compliant. This affirms our commitment to implementing and maintaining the highest standards of information security and operational integrity.

  • ISO 27001: Ensures Authgear's Information Security Management System (ISMS) meets international best practices for managing sensitive company and customer information.
  • SOC 2 Type II: Validates Authgear's ability to securely manage customer data, ensuring trust and privacy across critical service criteria

Feel free to reach us via our contact form for more details on our security certifications.

Data Centers

Authgear's physical infrastructure is hosted and managed within Google's secure data centers around the globe and utilizes the Google Cloud Platform (GCP) technology. Independent and thorough assessments on security, privacy and compliance controls are regularly conducted by Google to ensure they are up to industry standards. In fact, Google's data center operations have been accredited under:

  • ISO 27001
  • ISO/IEC 27017
  • ISO/IEC 27018
  • SOC 1/2/3
  • PCI DSS
  • CSA STAR

On the other hand, Stripe, a PCI DSS Level 1 compliant payment gateway, is our choice for securing and processing card payments.

Payment Card Industry Data Security Standard (PCI DSS) Compliance

PCI DSS is a set of industry-mandated requirements that applies to any business that handles, processes, or stores credit cards regardless of the its size or location.

Authgear does not fall into that category, as we do NOT store any financial data nor process payments.

Security Measures from Data Centers

Google-managed data centers are certified with ISO 27001. Google has many years of experience in securing data and handling emergencies at large-scale data centers all over the world, and they have applied this experience to GCP and its infrastructure.

These facilities are one of the safest residence for your data, with a world-wide industry-leading security team works 24/7 monitoring and constantly improving the security measures. Data is distributed across multiple machines in different locations with various backups replicated to avoid a single point of failure. Backup data is chunked for random distribution to add an extra layer of security, making it not human-readable.

Physically, secure perimeter defense systems, comprehensive camera coverage and 24/7 guard teams are deployed to prevent any unauthorized access. Plus, data center staffs are trained to be security minded, and their access to the facilities is immediately revoked once they do not have a need for these privileges.

Regular tracking and monitoring are applied to hard drives at these facilities as well, and when one has reached the end of it life, it will be destroyed through a thorough, multi-step process.

Environmental Safeguards

Fire Detection and Suppression

Robust disaster recovery measures are applied in place. In the event of a fire or other physical disruption, data is shifted automically to other data centers, allowing the users to work uninterrupted.

Power

Power failure is also considered, with backup generators installed in response to that.

Climate and Temperature Control

Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are designed to maintain atmospheric conditions at optimal levels. Monitoring systems and data center personnel ensure temperature and humidity are at the appropriate levels.

Network Security

Firewalls

Firewalls are utilized to restrict access to systems from external networks and between systems internally. By default, all access is denied and only explicitly allowed ports and protocols are allowed based on business need. Each system is assigned to a firewall security group based on the system's function. Security groups restrict access to only the ports and protocols required for a system's specific function to mitigate risk.

Spoofing and Sniffing Protections

Managed firewalls prevent IP, MAC, and ARP spoofing on the network and between virtual hosts to ensure spoofing is not possible. Packet sniffing is prevented by infrastructure including the hypervisor which will not deliver traffic to an interface which it is not addressed to. Authgear utilizes application isolation, operating system restrictions, and encrypted connections to further ensure risk is mitigated at all levels.

Port Scanning

Port scanning is prohibited and every reported instance is investigated by our infrastructure provider. When port scans are detected, they are stopped and access is blocked.

System Security

System Configuration

System configuration and consistency are maintained through standard up-to-date images, configuration management software, and by replacing systems with updated deployments. Systems are deployed using verified and safe images that are updated with configuration changes and security updates before deployment. Once deployed, existing systems are decommissioned and replaced.

System Authentication

Operating system access is limited to Authgear staffs only and requires username, key and multi-step authentication. Operating systems do not allow password authentication to prevent password brute-force attacks, theft, and sharing.

Disaster Recovery

Authgear is designed for stability and scaling, and inherently mitigates common issues that lead to outages while maintaining recovery capabilities. Our platform maintains redundancy to prevent single points of failure, and is able to replace failed components.

Access to Customer Data

Authgear staff does not access or interact with customer data or applications as part of normal operations. There may be cases where Authgear is requested to interact with customer data or applications at the request of the customer for support purposes or where required by law. Authgear may also inspect customer data to debug and troubleshoot platform issues.

Start building with Authgear

Start for free Schedule a demo

Free plan includes unlimited MAUs

Authgear
Authgear 由 SkyMakers Digital Group 提供
ISO 27001 認證Passkey Pledge 合作夥伴

Authgear 已通過 ISO 27001 與 SoC 2 Type II 認證。

  • 產品
  • 自建版(ONCE)
  • 雲端版
  • 定價
  • SAML 遷移
  • 產品替代方案
  • Okta 替代方案
  • Auth0 替代方案
  • Cognito 替代方案
  • Firebase 替代方案
  • 開發者
  • 文件
  • API 參考
  • GitHub
  • 社群論壇
  • Discord
  • 整合
  • 資源
  • 部落格
  • 登入畫廊
  • 名詞解釋
  • 免費工具
  • OIDC Discovery 探索器
  • SSL 檢查工具
  • UUID v7 產生器
    與時間戳解析器
  • Base64 編解碼
  • JWT 與 JWE 除錯器
  • JWK 產生器
  • 密碼雜湊產生/驗證
  • HMAC 簽章產生/驗證
  • SAML 測試工具
  • TOTP 驗證器
  • 公司
  • 關於我們
  • 聯絡業務
  • SkyMakers Digital
  • 我們的承諾
© 2026 Authgear。保留所有權利。
服務條款·合理使用政策·隱私權政策·安全性與合規·企業授權·SLA
  • English
  • 中文