limited-city-59768
02/10/2024, 1:08 PMchilly-king-10285
02/10/2024, 1:08 PMchilly-king-10285
02/10/2024, 1:08 PMapplication/json
response for API Clients and Client-Side Browser applications [source](https://www.ory.sh/docs/kratos/self-service/flows/user-registration#registration-form-validation). In summary, creating an identity is about defining the data structure for a user, while registering a user is about the process a user goes through to create an account.limited-city-59768
02/10/2024, 1:12 PMchilly-king-10285
02/10/2024, 1:12 PMchilly-king-10285
02/10/2024, 1:12 PMlimited-city-59768
02/10/2024, 5:55 PMchilly-king-10285
02/10/2024, 5:55 PMchilly-king-10285
02/10/2024, 5:55 PMjson { "credentials": { "password": { "config": { "password": "new-password" } } } }
In this JSON payload, replace "new-password" with the new password. This password will then be hashed according to the configured password hashing algorithm and stored in the database [source](https://www.ory.sh/docs/kratos/manage-identities/import-user-accounts-identities#importing-credentials). Please note that this operation should be performed securely to prevent unauthorized access or changes to user data.limited-city-59768
02/10/2024, 5:57 PMchilly-king-10285
02/10/2024, 5:57 PMchilly-king-10285
02/10/2024, 5:57 PMlimited-city-59768
02/10/2024, 6:20 PMchilly-king-10285
02/10/2024, 6:20 PMchilly-king-10285
02/10/2024, 6:20 PMoryAccessToken
) for authentication [source](https://www.ory.sh/docs/reference/api). This access token is typically granted to authenticated users or administrators who have the necessary permissions to perform such operations. The access token ensures that the operation is performed by an authorized entity. In a well-designed system, regular users would not have the necessary permissions to update the identities of other users. Only administrators or users with specific roles would have such permissions. Therefore, even if someone knows the identity ID of another user, they would not be able to update the identity without the necessary access token. This is a crucial aspect of maintaining security and preventing unauthorized access or changes to user data.