Choosing the appropriate reCAPTCHA Enterprise key type
Learn about the different key types and choose the appropriate key.
Creating reCAPTCHA keys
Learn how to create reCAPTCHA keys for websites and mobile platforms.
Configuring Multi-factor authentication (MFA)
Learn how to protect your users from credential stuffing attacks and account takeovers (ATOs) by verifying your users' identity using MFA.
Detecting password leaks and breached credentials
Learn how to protect your users from account takeovers (ATOs) and credential stuffing attacks by checking their passwords against our leak database.
Detecting and preventing account-related fraudulent activities
Learn how to identify account-related fraudulent activities by using reCAPTCHA Enterprise account defender.
Identifying accounts that show related behaviors
Learn how to identify user accounts that show related behaviors.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.