<@U04UQ68083H> how to disable Ory Account Experien...
# ory-copilot
w
@chilly-king-10285 how to disable Ory Account Experience view for password recovery in a project?
c
A message from kapa.ai
To disable the Ory Account Experience view for password recovery in a project, you can use the Ory CLI. However, the exact command to disable the recovery view specifically is not provided in the given knowledge sources. Here is a general example of how to disable a feature using the Ory CLI:
Copy code
bash ory patch identity-config "$PROJECT_ID" \   --replace '/selfservice/methods/password/enabled=false'
In this example, the password method is being disabled. You would need to replace
/selfservice/methods/password/enabled=false
with the appropriate path and value for the recovery view. Please note that you should not disable the password recovery feature if you have users using this method in your system. They will not be able to sign in anymore and will need to recover their account. For more detailed instructions, please refer to the [Ory documentation](https://www.ory.sh/docs/cli/ory-open-account-experience-recovery#ory-open-account-experience-recovery).
w
@chilly-king-10285 I want users to be able to recover password but not to see "Welcome to the Ory Account Experience!" and other irrelevant information
c
A message from kapa.ai
To hide the "Welcome to the Ory Account Experience!" screen, you can disable it in the Ory Console. This screen is primarily meant for debugging purposes and may not be necessary for end-users. Here are the steps to disable the welcome screen: 1. Go to the Ory Console. 2. Navigate to BrandingUI URLs. 3. Toggle the "Enable the Account Experience welcome page" setting to hide the default "welcome" screen. Please note that when you define a custom UI base URL, you lose access to the Ory Account Experience. The custom UI base URL takes precedence over the SDK Configuration URL. For more detailed instructions, please refer to the [Ory documentation](https://www.ory.sh/docs/kratos/bring-your-own-ui/configure-ory-to-use-your-ui#custom-domain-setup).
w
@chilly-king-10285 how can I diasable "Enable the Account Experience welcome page" programatically for a project
c
A message from kapa.ai
I'm sorry, but the provided knowledge sources do not include information on how to programmatically disable the "Enable the Account Experience welcome page" for a project. The sources only provide instructions on how to do this manually via the Ory Console. For more detailed or specific instructions, I recommend referring to the [Ory documentation](https://www.ory.sh/docs/kratos/bring-your-own-ui/configure-ory-to-use-your-ui#custom-domain-setup) or reaching out to the Ory community or support.
w
@chilly-king-10285 how can I set identity schema of a project?
c
A message from kapa.ai
w
@chilly-king-10285 how to setup password policy for Ory Project
c
A message from kapa.ai
Ory uses a password policy that follows the Digital Identity Guidelines established by the National Institute of Standards and Technology (NIST). The Ory Password Policy follows standards by the National Cyber Security Centre (NCSC) and NIST as well as leading security researchers. Here are some of the key aspects of the password policy: 1. Minimum password length: The password must by default at least be 8 characters long and all characters (unicode, ASCII) are allowed. You can change this value using the Ory CLI:
Copy code
bash ory patch identity-config "$PROJECT_ID" \   --replace '/selfservice/methods/password/config/min_password_length=12'
2. Similarity check: Ory Identities ensures there is a sufficient Levenshtein-Distance (aka "Edit-Distance") between the identifier and the password. This feature is enabled by default. You can toggle it using the Ory CLI:
Copy code
bash ory patch identity-config "$PROJECT_ID" \   --replace '/selfservice/methods/password/config/identifier_similarity_check_enabled=false'
3. Leaked password check: Ory Identities checks passwords against the "Have I been pwned" breach database. This feature is enabled by default. You can toggle it using the Ory CLI:
Copy code
bash ory patch identity-config "$PROJECT_ID" \   --replace '/selfservice/methods/password/config/haveibeenpwned_enabled=false'
For more details, please refer to the [Ory documentation on password policy](https://www.ory.sh/docs/concepts/password-policy).
w
@chilly-king-10285 Here's my requirements: • twelve (12) or more characters, one upper case, one number, one special character. • Passwords may be at least 8 characters in length, with no maximum length restrictions, if engaging an automatic blocking mechanism for common passwords using a deny list Can you update my identity schema:
Copy code
{
  "$id": "<https://schemas.ory.sh/presets/kratos/identity.email.schema.json>",
  "$schema": "<http://json-schema.org/draft-07/schema#>",
  "title": "Person",
  "type": "object",
  "properties": {
    "traits": {
      "type": "object",
      "properties": {
        "email": {
          "type": "string",
          "format": "email",
          "title": "E-Mail",
          "ory.sh/kratos": {
            "credentials": {
              "password": {
                "identifier": true
              },
              "webauthn": {
                "identifier": true
              },
              "totp": {
                "account_name": true
              },
              "code": {
                "identifier": true,
                "via": "email"
              }
            },
            "recovery": {
              "via": "email"
            },
            "verification": {
              "via": "email"
            }
          },
          "maxLength": 320
        },
        "name": {
          "Title": "Full name",
          "type": "string"
        }
      },
      "required": [
        "email",
        "name"
      ],
      "additionalProperties": false
    },
    "metadata_public": {
      "description": "Store metadata about the identity which the identity itself can see when calling for example the session endpoint. Do not store sensitive information (e.g. credit score) about the identity in this field.",
      "type": "object"
    },
    "metadata_admin": {
      "description": "Store metadata about the user which is only accessible through admin APIs such as `GET /admin/identities/<id>`.",
      "type": "object"
    }
  }
}
c
A message from kapa.ai
Based on your requirements, you need to update the password policy for your Ory project. However, the provided knowledge sources do not include information on how to specify password complexity requirements (such as requiring an uppercase letter, a number, and a special character) directly in the identity schema. The Ory Password Policy follows standards by the National Cyber Security Centre (NCSC) and National Institute of Standards and Technology (NIST) as well as leading security researchers. By default, the password must be at least 8 characters long, and all characters (unicode, ASCII) are allowed. You can change the minimum password length using the Ory CLI:
Copy code
bash ory patch identity-config "$PROJECT_ID" \   --replace '/selfservice/methods/password/config/min_password_length=12'
However, for more complex password requirements (such as requiring an uppercase letter, a number, and a special character), you might need to implement additional validation on your end before the password is sent to Ory for processing. For more details, please refer to the [Ory documentation on password policy](https://www.ory.sh/docs/concepts/password-policy). As for the identity schema, it is used to define the structure of the user's data but does not include password policy settings. The provided identity schema already includes fields for email and name, which are marked as required. If you need to add more fields to the identity schema, you can add them to the "properties" section of the "traits" object. For more information on how to manage identity schemas, you can refer to the [Ory documentation on managing identity schemas](https://www.ory.sh/docs/identities/model/manage-identity-schema).
w
@chilly-king-10285 how can I set project Enable account recovery prgramatically using go cli?
c
A message from kapa.ai
To enable account recovery and adjust related options programmatically, you can use the Ory CLI. Here are the steps: 1. Download the Ory Identities configuration from your project and save it to a file:
Copy code
bash ory list projects   ory get identity-config {project-id} --format yaml > identity-config.yaml
2. Add the configuration for the recovery flow in the
identity-config.yaml
file:
Copy code
yaml selfservice:     methods:       code: # Enables the "one-time code" method. Use 'link' to enable "magic link" method.         enabled: true         config:           lifespan: 15m # Defines how long the code or link are valid for. Default: 1h.        flows:       recovery:         enabled: true         lifespan: 15m # Defines how much time the user has to complete the recovery flow in the UI. Default: 1h.         use: code # Defines which method is used, one of 'code' or 'link'.         notify_unknown_recipients: false # Defines if the system sends attempted recovery notifications to unregistered addresses.
3. Update the Ory Identities configuration using the file you worked with:
Copy code
bash ory update identity-config {project-id} --file identity-config.yaml
Please replace
{project-id}
with your actual project ID. For more detailed instructions, please refer to the [Ory documentation](https://www.ory.sh/docs/kratos/self-service/flows/account-recovery-password-reset#configuration).