Password Exposure API ONLY
For SpyCloud Consumer ATO Prevention.
🔐 Password Exposure API — Overview
Recommended for enterprises that are restricted from sending hashed identifiers over the network.
💡 Why Use It
If a password has ever appeared in the SpyCloud database, it’s already in the hands of cybercriminals and may be used in password spraying attacks.
Blocking your consumers from choosing a password that has been exposed dozens, hundreds, thousands, or even millions of times strengthens their account security and helps to protect them from account takeover.
✅ What It Can Do
- Checks passwords as they are created (point-in-time check) when consumers set up an account, change their password, or have their password reset.
- Checks each new password against SpyCloud’s entire database (billions of passwords recovered from criminal communities).
- Identifies how many times a password has ever appeared in the SpyCloud database, allowing you to tailor your threshold for rejecting a password and avoid friction
- Uses k-anonymity, meaning only the first 5 characters of a password hash are sent over the network.
- Supports alignment with NIST password standards.
- Does not check passwords that are already in use for new breach exposures
Important: The Password Exposure API checks passwords at one point in time: creation. If a user’s credentials appear in a breach later on in the account lifecycle, the Password Exposure API won’t check them.
⚙️ How It Works
To securely check password-only matches against the entire SpyCloud database, the Password Exposure API uses an approach called k-anonymity. Only the first 5 characters of each password hash are sent over the network – never the user’s plaintext password.
🧭 When to Use It
Customers typically query the Password Exposure API whenever a customer creates a new password, which includes account creation, password resets, and password changes. See the “Implementation” section for more detailed information.
Updated 2 months ago