Authentication
Last updated: Mar 24, 2026
This section includes the following authentication measures adopted by Fluid Attacks:
Compliance
Security measures of Fluid Attacks to protect the information of clients while performing Continuous Hacking in their systems.
Authentication for clients
Clients authenticate on the Fluid Attacks platform using SSO with Bitbucket, Google, or Microsoft via OAuth 2.0 and JWT with no passwords stored.