bored-truck-99820
08/21/2024, 12:09 PMchilly-king-10285
08/21/2024, 12:09 PMchilly-king-10285
08/21/2024, 12:09 PMbash ory patch identity-config "$PROJECT_ID" \ --replace '/selfservice/methods/password/config/haveibeenpwned_enabled=false'
In some environments, if it's difficult to establish egress connectivity to non-approved hosts, you can host the HiBP API yourself and configure Kratos to use your own instance. Here's how you can configure Kratos to use your API: yaml selfservice: methods: password: config: haveibeenpwned_host: api.private.host
However, this feature is not directly related to the recovery flow. The recovery flow is used to allow users to recover access to their accounts. It's used in conjunction with the settings flow and when a recovery flow is submitted, a session is issued to the application, allowing the user to reset their password and update their profile information on the settings page. Sources: - [Password policy - Leaked password check](https://www.ory.sh/docs/concepts/password-policy#leaked-password-check) - [Hosting your own breached password detection API](https://www.ory.sh/docs/kratos/guides/hosting-own-have-i-been-pwned-api) - [Recovery flow](https://www.ory.sh/docs/kratos/bring-your-own-ui/custom-ui-basic-integration#recovery)bored-truck-99820
08/21/2024, 12:11 PMchilly-king-10285
08/21/2024, 12:11 PMchilly-king-10285
08/21/2024, 12:11 PMbash ory patch identity-config "$PROJECT_ID" \ --replace '/selfservice/methods/password/config/haveibeenpwned_enabled=false'
If you want to use this feature in a restricted environment, you can host the HiBP API yourself and configure Kratos to use your own instance: yaml selfservice: methods: password: config: haveibeenpwned_host: api.private.host
For more specific control over password checks during admin API operations, you may need to refer to the Ory documentation or community for further guidance. Sources: - [Password policy - Leaked password check](https://www.ory.sh/docs/concepts/password-policy#leaked-password-check) - [Hosting your own breached password detection API](https://www.ory.sh/docs/kratos/guides/hosting-own-have-i-been-pwned-api)bored-truck-99820
08/21/2024, 12:12 PMchilly-king-10285
08/21/2024, 12:12 PMchilly-king-10285
08/21/2024, 12:12 PMPOST
request to the /self-service/registration
endpoint with the user's traits and password. This endpoint behaves differently for API and browser flows. More details can be found in the [Kratos API Reference](https://www.ory.sh/docs/kratos/reference/api).bored-truck-99820
08/21/2024, 12:15 PMchilly-king-10285
08/21/2024, 12:15 PMchilly-king-10285
08/21/2024, 12:15 PMbash ory patch identity-config "$PROJECT_ID" \ --replace '/selfservice/methods/password/config/haveibeenpwned_enabled=false'
However, this feature is primarily designed for self-service registration and it's not clear from the provided sources if it applies to the admin API as well. For more specific control over password checks during admin API operations, you may need to refer to the Ory documentation or community for further guidance. Sources: - [Password policy - Leaked password check](https://www.ory.sh/docs/concepts/password-policy#leaked-password-check) - [Hosting your own breached password detection API](https://www.ory.sh/docs/kratos/guides/hosting-own-have-i-been-pwned-api)bored-truck-99820
08/21/2024, 12:26 PMchilly-king-10285
08/21/2024, 12:26 PMchilly-king-10285
08/21/2024, 12:27 PMyaml selfservice: methods: password: config: haveibeenpwned_host: api.private.host
Alternatively, this feature can be disabled altogether. However, by doing so you will significantly decrease the security of the service and not follow NIST guidelines. Sources: - [Hosting your own breached password detection API](https://www.ory.sh/docs/kratos/guides/hosting-own-have-i-been-pwned-api) - [Password policy - Leaked password check](https://www.ory.sh/docs/concepts/password-policy#leaked-password-check)bored-truck-99820
08/21/2024, 12:30 PMchilly-king-10285
08/21/2024, 12:30 PMchilly-king-10285
08/21/2024, 12:30 PMyaml selfservice: methods: password: config: haveibeenpwned_host: api.private.host
Remember, these are just examples and the actual reasons can vary based on the specific policies and network setup of your organization. Sources: - [Hosting your own breached password detection API](https://www.ory.sh/docs/kratos/guides/hosting-own-have-i-been-pwned-api) - [Password policy - Leaked password check](https://www.ory.sh/docs/concepts/password-policy#leaked-password-check)bored-truck-99820
08/21/2024, 12:33 PMchilly-king-10285
08/21/2024, 12:33 PMchilly-king-10285
08/21/2024, 12:33 PMbored-truck-99820
08/21/2024, 12:34 PMchilly-king-10285
08/21/2024, 12:34 PMchilly-king-10285
08/21/2024, 12:34 PM