- How does it work?
- How do we treat malicious sign-up attempts?
- Configuration
- Triage and debug ArkoseLabs issues
- Allowlists
- Feedback Job
- Test your integration
- Additional resources
Arkose Protect
GitLab integrates Arkose Protect to guard against malicious users from creating accounts.
How does it work?
If Arkose Protect determines that the user is suspicious, it presents an interactive challenge below
the Sign in
button. The challenge needs to be completed to proceed with the sign-in
attempt. If Arkose Protect trusts the user, the challenge runs in transparent mode, meaning that the
user doesn’t need to take any additional action and can sign in as usual.
How do we treat malicious sign-up attempts?
Depending on the risk score received, a user might be required to perform up to three stages of identity verification to register an account.
Configuration
To enable Arkose Protect:
- License ArkoseLabs.
- Get the public and private API keys from the ArkoseLabs Portal.
-
Enable the ArkoseLabs login challenge. Run the following commands in the Rails console, replacing
<your_public_api_key>
and<your_private_api_key>
with your own API keys.Feature.enable(:arkose_labs_signup_challenge) ApplicationSetting.current.update(arkose_labs_public_api_key: '<your_public_api_key>') ApplicationSetting.current.update(arkose_labs_private_api_key: '<your_private_api_key>')
Triage and debug ArkoseLabs issues
You can triage and debug issues raised by ArkoseLabs with:
- The GitLab production logs.
- The Arkose logging service.
View ArkoseLabs Verify API response for a user session
To view an ArkoseLabs Verify API response for a user, query the GitLab production logs with the following KQL:
KQL: json.message:"Arkose verify response" AND json.username:replace_username_here
If the query is valid, the result contains debug information about the user’s session:
Response | Description |
---|---|
json.response.session_details.suppressed
| Value is true if the challenge was not shown to the user. Always true if the user is allowlisted.
|
json.arkose.risk_band
| Can be low , medium , or high . Ignored on sign in. Use to debug identity verification issues.
|
json.response.session_details.solved
| Indicates whether the user solved the challenge. Always true if the user is allowlisted.
|
json.response.session_details.previously_verified
| Indicates whether the token has been reused. Default is false . If true , it might indicate malicious activity.
|
Check if a user failed an ArkoseLabs challenge
To check if a user failed to sign in because the ArkoseLabs challenge was not solved, query the GitLab production logs with the following KQL:
KQL: json.message:"Challenge was not solved" AND json.username:replace_username_here`
Allowlists
To ensure end-to-end QA test suites can pass during staging and production, we’ve allowlisted the GITLAB_QA_USER_AGENT. Each QA user receives an ALLOWLIST
risk category.
You can find the usage of the allowlist telltale in our Arkose::VerifyResponse class.
Feedback Job
To help Arkose improve their protection service, we created a daily background job to send them the list of blocked users by us.
This job is performed by the Arkose::BlockedUsersReportWorker
class.
Test your integration
In staging and development environments only, you can suppress a challenge, or force one to appear. You can use this feature if you want to receive a specific risk band.
To force a challenge, change your browser user agent string. You can find the appropriate string in 1Password.
Alternatively, to request specific behaviors, modify the setConfig
to include a data.id
property:
-
'ML_defence'
- Force a challenge to appear. -
'customer_request'
- Suppress a challenge. If you suppress a challenge, ArkoseLabs considers your session safe.
For example, this setConfig
suppresses a challenge:
arkoseObject.setConfig({
data: { id: 'customer_request' },
...
});
Additional resources
The Anti-abuse team owns the ArkoseLabs Protect feature. You can join our ArkoseLabs/GitLab collaboration channel on Slack: #ext-gitlab-arkose.
ArkoseLabs also maintains the following resources: