CompromisedPasswordFiltering: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
UMIACS passwords, in accordance with best practices recommended by NIST, | UMIACS passwords, in accordance with best practices recommended by NIST, does not allow passwords to be used that have been included in a known data breach. UMIACS systems check that a new password you wish to set is not among hundreds of millions of compromised passwords. | ||
We use the [https://haveibeenpwned.com/Passwords Have I Been Pwned (HIBP)] corpus of passwords as the data source of passwords that are checked against. | We use the [https://haveibeenpwned.com/Passwords Have I Been Pwned (HIBP)] corpus of passwords as the data source of passwords that are checked against. |
Latest revision as of 21:45, 9 January 2025
UMIACS passwords, in accordance with best practices recommended by NIST, does not allow passwords to be used that have been included in a known data breach. UMIACS systems check that a new password you wish to set is not among hundreds of millions of compromised passwords.
We use the Have I Been Pwned (HIBP) corpus of passwords as the data source of passwords that are checked against.