RePro’s Hotlink Protection is a robust, token-based security mechanism that ensures video streams can only be accessed by authenticated users under tightly controlled conditions. It prevents unauthorized sharing, embedding, or hijacking of stream URLs.
How It Works
When Hotlink Protection is enabled at the project level, RePro issues stream access through secure, short-lived linkstied to the authenticated user's session. These links are protected with secure tokens and are specific to the following:
The individual player instance
The user’s device
The user's IP address
The authenticated user identity
This means even if someone tries to share a link, it cannot be reused by anyone else under any circumstances.
Link Refresh Rate
RePro allows you to define a link refresh rate, which determines how often a new secure stream link is generated for an ongoing viewer session. The refresh rate can be configured to be as low as 1 minute or longer, depending on your desired level of security.
Example:
If set to a 2-minute refresh rate, the viewer will receive a newly signed stream link every 2 minutes behind the scenes.
Seamless Playback Experience
While the link refreshes periodically, this process is completely seamless for the viewer. There are:
No playback interruptions
No visible changes in the stream behavior
No additional user input required
This maintains a smooth user experience while ensuring that the stream remains protected at all times.
Enabling Hotlink Protection
To enable Hotlink Protection:
Go to your project settings in the RePro web dashboard.
Navigate to the Security tab.
Enable Hotlink Protection.
Set your desired link refresh interval (minimum 1 minute).
Save the changes.
Use Cases
Preventing link sharing or URL-based piracy
Ensuring content is consumed only within authenticated apps or sites
Protecting premium, licensed, or subscriber-only streams
Best Practices
Combine Hotlink Protection with user authentication and role-based access controls.
Use shorter refresh intervals for higher-value or sensitive content.
Monitor token issuance logs to track access patterns and detect anomalies.