This policy is used by the events subsystem. You can use this policy to match events by multiple different criteria, to choose when you get notified.
See Expression Policy.
Have I Been Pwned Policy
This policy is deprecated since authentik 2022.11.0, as this can be done with the password policy now.
This policy checks the hashed password against the Have I Been Pwned API. This only sends the first 5 characters of the hashed password. The remaining comparison is done within authentik.
This policy can enforce regular password rotation by expiring set passwords after a finite amount of time. This forces users to set a new password.
This policy allows you to specify password rules, such as length and required characters. The following rules can be set:
- Minimum amount of uppercase characters.
- Minimum amount of lowercase characters.
- Minimum amount of symbols characters.
- Minimum length.
- Symbol charset (define which characters are counted as symbols).
Starting with authentik 2022.11.0, the following checks can also be done with this policy:
- Check the password hash against the database of Have I Been Pwned. Only the first 5 characters of the hashed password are transmitted, the rest is compared in authentik
- Check the password against the password complexity checker zxcvbn, which detects weak password on various metrics.
authentik keeps track of failed login attempts by source IP and attempted username. These values are saved as scores. Each failed login decreases the score for the client IP as well as the targeted username by 1 (one).
This policy can be used, for example, to prompt clients with a low score to pass a captcha before they can continue.
To make sure this policy is executed correctly, set
Re-evaluate policies when using it with a flow.