The most scalable and customizable identity server on the market. Replace your Homegrown, Auth0, Okta, Firebase with better UX and DX. Has all the tablestakes: Passkeys, Social Sign In, Multi-Factor Auth, SMS, SAML, TOTP, and more. Written in Go, cloud native, headless, API-first. Available as a service on Ory Network and for self-hosters.
When submitting a verification flow with an existing email and an insecure password, the flow only returns the error that the password is insecure:
"id":4000005,
"text":"The password can not be used because the password has been found in data breaches and must no longer be used.",
"type":"error",
"context":{
"reason":"the password has been found in data breaches and must no longer be used"
}
}
If the verification flow is submitted with an existing email and a secure but invalid password (does not match the credentials stored) the expected error is returned:
{
"id":4000007,
"text":"An account with the same identifier (email, phone, username, ...) exists already.",
"type":"error",
"context":{
}
}
Reproducing the bug
Run Kratos v0.11.1 with the check against the "Have I been pwned?" database enabled
Register an identity
Create a new registration flow
Submit the registration flow with the email of the identity created before and a password of "Test1234"
Relevant log output
No response
Relevant configuration
No response
Version
0.11.1
On which operating system are you observing this issue?
Preflight checklist
Describe the bug
When submitting a verification flow with an existing email and an insecure password, the flow only returns the error that the password is insecure:
If the verification flow is submitted with an existing email and a secure but invalid password (does not match the credentials stored) the expected error is returned:
Reproducing the bug
Relevant log output
No response
Relevant configuration
No response
Version
0.11.1
On which operating system are you observing this issue?
None
In which environment are you deploying?
None
Additional Context
No response