Skip to content

tdgroot/magento2-module-pwned-validator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Magento 2 Have I Been Pwned Validator

This module adds a validator which checks if the submitted password is found in public databases using the Have I Been Pwned? service.

Security

There are no security drawbacks, because there are no actual passwords being submitted over the internet. This is possible by hashing the password using the SHA-1 algorithm and request all hashes in the Have I been Pwned? databases starting with the first 5 characters of the password hash. This resultset contains a list of hashes and the amount of occurrences.

This way the password stays inside the Magento process.

Installation

composer require timpack/magento2-module-pwned-validator
bin/magento setup:upgrade

Configuration

You can configure the threshold of the validator, at which count of occurrences in the resultset the password should be considered insecure/invalid. This configuration can be found at:

Stores -> Configuration -> Customer -> Customer Configuration -> Pwned Validator -> Minimum amount of matches

Credits

This module was heavily inspired by Valorin's Pwned validator written for Laravel: valorin/pwned-validator

About

Add 'Have I been pwned?' validation to Magento 2.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 2

  •  
  •  

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy