Cryptrac LogoCryptrac
  • Blog
  • Documentation
  • Pricing
  • FAQ
  • About
  • Contact
Sign InSign Up
  • Blog
  • Documentation
  • Pricing
  • FAQ
  • About
  • Contact
Cryptrac LogoCryptrac

The simplest way to accept cryptocurrency payments. Non-custodial, secure, and designed for modern businesses.

© Copyright 2025 Cryptrac. All Rights Reserved.

Company
  • About
  • Blog
  • Become A Sales Rep
  • Security
Product
  • Documentation
  • Pricing
Help
  • Contact
  • FAQ
Legal
  • Terms of Service
  • Privacy Policy
  • Cookie Policy
Follow Us
  • Twitter/X
  • Instagram
  • Overview
  • Platform Architecture
  • Data Protection
  • Transaction Security
  • Authentication
  • Infrastructure
  • Compliance
  • Incident Response
  • Your Responsibilities
  • Report Issues

Authentication and Access Control

Multi-factor authentication, session management, and access security

Strong authentication and access control are critical to protecting your account and sensitive operations.

Multi-Factor Authentication (MFA)

Supported MFA Methods

  • Authenticator Apps: TOTP-based authentication (Google Authenticator, Authy)
  • SMS Codes: Text message verification (where available)
  • Hardware Keys: FIDO2 and WebAuthn support
  • Backup Codes: Secure recovery options

MFA Best Practices

  • Mandatory MFA for sensitive operations
  • Flexible MFA configuration
  • Multiple device enrollment
  • Secure backup code storage

Session Management

Secure Session Handling

  • Token-Based Authentication: JWT with secure signing
  • Session Expiration: Configurable timeout periods
  • Automatic Logout: Inactivity-based session termination
  • Session Revocation: Ability to terminate all sessions

Session Security Features

  • Encrypted session storage
  • Secure cookie attributes (HttpOnly, Secure, SameSite)
  • Session binding to IP address and device
  • Concurrent session management

Device and Location Tracking

Device Management

  • Device Registration: Track and manage authorized devices
  • Device Fingerprinting: Unique device identification
  • New Device Alerts: Notifications for unrecognized devices
  • Device Revocation: Remove access from specific devices

Location-Based Security

  • Geolocation tracking for login attempts
  • Unusual location detection
  • Travel mode for legitimate location changes
  • IP address monitoring and alerts

Password Security

Password Requirements

  • Minimum length and complexity requirements
  • Common password prevention
  • Password history enforcement
  • Breach password detection

Password Management

  • Secure password reset flows
  • Email verification for password changes
  • Password strength meter
  • Encrypted password storage using bcrypt

Access Logging and Monitoring

Audit Trail

  • Comprehensive login history
  • Failed authentication attempts
  • Password change logs
  • Session activity tracking

Security Alerts

  • Email notifications for suspicious activity
  • Real-time alerts for security events
  • Configurable notification preferences
  • Security event dashboard
  1. Multi-Factor Authentication (MFA)
    1. Supported MFA Methods
    2. MFA Best Practices
    3. Session Management
    4. Device and Location Tracking
    5. Password Security
    6. Access Logging and Monitoring