Protect your account with advanced access controls.

The Security section helps users manage authentication and access integrity for their Xuda account. From this interface, users can view Sensitive Logs, monitor active Sessions, and manage authorized SSH Keys. This centralized approach provides complete transparency and control over login activity and credential management.

Users can review sign-in locations, terminate unwanted sessions, and rotate SSH keys used for secure deployment access. The Sensitive Logs feature captures account-level security actions—such as password changes, API key usage, and login attempts—ensuring auditability and protection against unauthorized activity.

Sensitive Logs

Audit security-related activity such as password resets, API access, and login attempts in real time.

Session Management

View all active login sessions with timestamps, IP addresses, and devices; revoke access instantly if needed.

SSH Key Management

Add, view, or remove SSH keys associated with deployments and projects for secure remote access.

Real-Time Alerts

Receive notifications for new device logins, revoked sessions, or failed access attempts to stay informed of changes.

Enhanced Authentication

Integrate with multi-factor authentication or hardware keys to strengthen account protection across environments.

FAQs

You can oversee your account’s authentication details, review active sessions, manage SSH keys, and view sensitive activity logs for full security control.

Sensitive Logs record important security-related actions such as password changes, API key usage, and login attempts to help detect suspicious activity.

Yes. The Sessions tab lists all active and historical logins with details like device type, IP address, and location.

You can terminate individual sessions from the list or revoke all active sessions at once for immediate account lockdown.

SSH keys provide secure, passwordless authentication for deploying projects or accessing protected environments within Xuda.

Yes. You can add new keys for trusted devices or remove outdated ones directly from the SSH Keys tab to maintain account integrity.

Immediately revoke all sessions, rotate your SSH keys, and review Sensitive Logs to identify the source of the activity.

Yes. Every new device login attempt is recorded with timestamp, location, and IP details for auditing and security monitoring.

Yes. Two-factor authentication can be enabled for an extra layer of protection during sign-in, reducing unauthorized access risks.

It centralizes control over sessions, keys, and sensitive activity, ensuring complete visibility and protection of your account and assets.

Develop. Deploy. Stay Productive.

Xuda is the platform for frontend developers, providing the speed and reliability innovators need to create at the moment of inspiration.

Schedule a demo