PageSpace uses opaque session tokens, per-event authorization, and distributed rate limiting to protect your data at every step.
Unlike JWTs that can be decoded by anyone, PageSpace uses opaque tokens with hash-only storage for maximum security.
We never store your actual session token—only a SHA-256 hash. Even if our database were compromised, attackers couldn't use the hashes.
Sessions can be revoked immediately—no waiting for token expiration. Password changes invalidate all existing sessions.
Real-time collaboration doesn't mean relaxed security. Every write operation is authorized in real-time.
Document updates, file uploads, and task changes are re-authorized on every event—not just at connection time.
Socket tokens expire in 5 minutes, limiting exposure if intercepted. Connection requires fresh authentication.
Inter-service communication uses HMAC-SHA256 signatures with timestamp validation to prevent replay attacks.
Protection against brute force attacks with rate limiting that persists across restarts and IP changes.
5 attempts per 15 minutes, per IP and per email
15-minute lockout after 10 failed attempts (database-backed)
3 signups per hour to prevent abuse
Lockout state isn't lost when servers restart
Attackers can't bypass by changing IP addresses
Lockout expires automatically after 15 minutes
Multiple secure authentication methods with strong password requirements and OAuth integration.
Strong password requirements with bcrypt hashing (cost factor 12).
Secure OAuth flows with signed state parameters and strict redirect validation.
All state-changing requests require CSRF validation with HMAC-signed tokens and timing-safe comparison. Even login forms have CSRF protection via a separate pre-login system.
Read our security documentation or contact us for more details about our security practices.
Search docs, blog posts, and more.