This page summarizes how Stellarbridge secures access to the portal and APIs today. It is written for users and administrators and only describes what we currently do in the product and our managed deployments.
Email and password sign‑in. Passwords are stored as secure hashes; we never store plaintext passwords.
Optional multi‑factor authentication (MFA) using time‑based one‑time passwords (TOTP).
New accounts use an email verification flow before full access is granted.
Sessions and tokens
Signed JSON Web Token (JWT) is issued on login and kept in a cookie named “stellarbridge”.
The JWT cookie is HttpOnly and set with SameSite=Lax. Typical lifetime is up to 24 hours.
We encrypt other application cookies at the framework level; the JWT cookie itself remains readable by the server but is not accessible to scripts in the browser.
Short‑lived server sessions are used for login/MFA challenges. When configured, we use Redis for session storage; otherwise the app falls back to in‑memory storage.
Authorization
Role‑based access control (RBAC) is enforced across API routes. We seed sensible default roles, and administrators can assign roles to users to govern access.
Rate limiting is enabled for API endpoints by default to reduce abuse and credential‑stuffing attempts. The current policy allows approximately 30 requests per 15 seconds per client for API routes (static assets are not limited).
Security‑relevant events such as successful and failed sign‑ins are recorded with timestamps and basic context (e.g., IP address). Logs are written asynchronously for reliability.
Application errors are handled centrally and recorded with structured fields to aid investigation without exposing sensitive data in responses.
If you need access to logs for your organization, contact support.