Skip to main content

Credential Intelligence

Overview

Credential Intelligence is a project template that provides a set of pre-configured patterns to help you build a credential intelligence solution. This solution is designed to help you detect and respond to credential leaks and breaches in your identity managment.

Getting Started

To get started with the Credential Intelligence project template, follow these steps:

  1. Navigate to nevisAdmin4 -> Resources -> Project Templates.

  2. Select the Credential Intelligence Integration project template.

    Credential Intelligence Project Template
  3. Choose a name for the project and click Create.

Credential Intelligence Project Template Create

The project template

The Credential Intelligence Project Template has the following patterns:

Credential Intelligence Project Template Create

Credential Intelligence

The Credential intelligence label shows the following set of configured patterns:

Pattern NameTypeDescription
auth_doneAuthentication DoneThe very last step of the authentication, marks the flows end.
Credential Intelligence (Login)Credential Intelligence IntegrationThis pattern is connected on the login flow. It checks compromised passwords during login
Credential Intelligence (Registration)Credential Intelligence IntegrationThis pattern is connected on the registration flow. It checks compromised passwords during registration
nevisIDM Change Credential (Registration)nevisIDM Change Password StateIf compromised password is detected, when pressing "Change Password" button, this allows the user to alter it.
nevisIDM Change Credential (Login)nevisIDM Change Password StateIf compromised password is detected, when pressing "Change Password" button, this allows the user to alter it.

Self Registration flow for IDM

For more details on setting up a self-registration flow for IDM, refer to the Simple Sign-Up/Sign-In Project Template.

Other labelled components

For more core setup related information refer to the Configuration Guide documentation.

What does this pattern do?

This document provides a brief overview of how this integration works.

  1. Password Hashing:
    • The script takes the user's password and hashes it using the SHA-1 hashing algorithm.
  2. API Call:
    • The script sends the first five characters of the generated SHA-1 hash to a public API.
  3. API Response:
    • The API responds with a list of 300 passwords that have the same first five characters as the SHA-1 hash.
  4. Remainder Check:
    • The script checks the remaining characters of the SHA-1 hash against the list of 300 passwords.
  5. User Alert:
    • If the remaining hash is found in the response, the script triggers a GUI that warns the user that their password might be unsafe.
  6. Authentication Flow Continuation:
    • If no match is found, the script allows the authentication process to continue as usual.

Error Handling

In case of error: script execution will be stopped and the default action of the pattern will trigger to avoid any break in the authentication flow.

You can change the default timeout value in the pattern's advanced settings to match your requirements.

In case of outage, and if the user set a compromised password the user will be prompted on the next login, when the API is back online.

API information

The api is provided by Have I Been Pwned.