Assess key device intelligence touchpoints
To make the most of Fingerprint, it’s important to know where it will be most useful on your platform. Are you focusing on stopping fraud or making your site more personalized? Begin by finding the pages or actions on your site that need visitor identification. These are usually places where sensitive actions happen or where it’s important to understand user behavior. Common areas include:- Login pages: Verify users by recognizing the devices they use.
- Transactions and checkouts: Check high-value transactions to detect suspicious purchases.
- Account updates: Add more security when users change important info, like passwords or personal details.
Establish baselines for visitor behavior
Next, you should analyze your visitor traffic to understand what normal behavior looks like for your platform. You can do this by using Fingerprint in a test phase or your current general analytics data. For example, is it normal for many devices to access a single account? If so, how many devices is typical? Do most users log in from the same device every time? Knowing these baselines helps you understand what’s normal and know when to raise red flags. Next, consider what device characteristics are more unusual for your users. For instance, if most of your users don’t use VPNs or incognito mode, you may consider those behaviors as risky.Define responses for flagged activity
After you understand what normal and suspicious behavior looks like for your platform, the next step is deciding how to respond. Having a range of responses based on the level of risk helps balance security with user experience. Based on the data you get from Fingerprint, here are some options:- Allow the action: For visitors with no signs of suspicious behavior, allow the action to proceed without adding extra steps, like MFA. This keeps the experience smooth for legitimate users.
- Add extra friction: If something seems off, you can add steps to verify the action. For example, if a user tries to make a purchase from an unfamiliar device, you could send a one-time code before completing the transaction.
- Block the action: Stop the action completely for high-risk behavior, like a bot trying to change account settings. This helps prevent unauthorized access or fraud.
- Manual review: In some use cases, it may make sense to flag the activity for manual review. This allows your team to look into the situation before making a final decision.
Prepare for data storage and system integrations
When implementing Fingerprint, plan how to store, manage, and integrate the IDs and device signals it provides. Fingerprint keeps identification data for a short time, usually 30 to 90 days, based on your plan. Decide if this works for you or if you need to store the data longer in your own storage.📘 Staying compliant with data privacy laws When storing identification data, make sure to consider your business needs and data regulations like GDPR, CCPA, and other applicable laws. Beyond storage, consider user consent requirements. Consent isn’t always needed for legitimate interests like fraud prevention but may be required for uses like personalization. To stay compliant, be sure to follow user consent and data residency rules.Plan how to analyze Fingerprint data so you can assess your setup and make it more effective. Set clear metrics, like the number of account takeovers prevented or fraudulent purchases stopped. Review these metrics often to adjust your logic and rules. Consider how Fingerprint data will fit into other systems. This might mean sending device signals to your Web Application Firewalls (WAFs) or fraud detection models. Look for areas where Fingerprint can improve security or enhance the user experience.
Map out installation and API usage
To integrate Fingerprint, you will need to add our JavaScript agent to your website in your frontend code. If you’re building mobile applications, we offer SDKs for both native apps and apps made with multi-platform frameworks. You’ll need to make a choice on how to safely get Fingerprint results to your server: Server API, Webhooks, or Sealed Client Results. The Server API can be accessed directly or through one of our backend SDKs. Requests should be made from a backend server capable of securely storing and accessing secret keys. You can also set up Fingerprint to send you identification data using webhooks. If you choose this option, you’ll need to create an endpoint on your server to receive and handle these webhook events. Webhooks provide a great way to store the full historical record of your event data. Finally, with Sealed Client Results, Enterprise customers can get a fully encrypted front-end response payload from the JavaScript agent. This payload contains the same data that is available through the/events Server API endpoint.