Data Breach Detection

Our Data Breach Detection feature enhances your security by identifying leaked passwords before they lead to unauthorized access on your site. The feature actively scans for known leaked credentials and cross-references them with attempts to sign in, sign up, or update a password. When a leaked password is detected, authentication is automatically suspended (if configured), preventing potential security risks.

You can enable the protection directly in your ReachFive Console to add protection around:

What are the benefits of Data Breach Detection 🤔

When you choose to add the Data Breach Detection feature to your ReachFive integration, you get added protection against data breaches, ensuring your users know your brand is dedicated to mitigating security risks on their behalf. Staying on top of leaked passwords builds trust and ensures valuable user information isn’t put at risk.

Enable the protection directly in the ReachFive Console knowing user events are logged to mark when leaked credentials are in use and deleted for further auditing purposes. Automatically notify users with dedicated email and SMS templates (Sign in option).


data breach detection

Sign up

When a user attempts to sign up with a leaked password, the sign up flow fails, telling the user that his or her password is too weak. This ensures that no one can sign up with a known leaked password.

To enable data breach detection for sign up:

  1. In your ReachFive Console, go to Settings  Security  Data Breach Detection.

  2. Under the Sign up section, toggle on the feature.

    dbd sign up

  3. Don’t forget to Save your input.

Sign in

When a user attempts to sign in with a leaked password, the user is sent an email or sms depending on what identifier the user attempted to sign in with (if enabled). You can also suspend the user with the suspension reason set to leakedCredentialsUsage.

  1. In your ReachFive Console, go to Settings  Security  Data Breach Detection.

  2. Under the Sign in section, toggle on the feature. For Sign in, you can choose to notify the user and/or suspend the user.

    dbd sign in

  3. Don’t forget to Save your input.

Email

Leaked Credentials Notification

Sent to user when they attempt to sign in with leaked credentials

This template should be used to notify users that they attempted to sign in with leaked credentials.

  1. Enable the template.

  2. Enter the sender’s email in the From field.

  3. Write your Subject.

    Credentials leaked
  4. Write your Message for the template.

    <p>Hello {{user.given_name}},</p> <p>Your credentials have been identified in a potential data breach. Please contact the site administrator to unlock your account.</p>
  5. Don’t forget to Save your input.

Custom provider templates

If you have configured a custom provider, your templates will be different and only contain the following fields:

Field Description

Enabled

Checkbox to enable the template.

enabled

Template ID

The ID that you assign to the template.

template id

Redirect to

The URL to which you want to redirect the user.

redirect to

URL Lifetime (seconds)

The URL lifetime in seconds.

url lifetime

SMS

Leaked Credentials Notification

Sent to user when they attempt to sign in with leaked credentials

This template should be used to notify users that they attempted to sign in with leaked credentials.

  1. Go to Settings  SMS  Templates on your ReachFive Console.

  2. Toggle to the Leaked Credentials Notification tab.

  3. Enable the template by ticking the Enabled checkbox.

  4. Use the Message section to write your customised template like the example below:

    Hi {{user.given_name}}. Your credentials have been identified in a potential data breach. Please contact the site administrator to unlock your account.
  5. Don’t forget to Save your input.


Custom provider templates

If you have configured a custom provider, your templates will be different and only contain the following fields:

Field Description

Enabled

Checkbox to enable the template.

enabled

Template ID

The ID that you assign to the template.

template id

Password update

When a user attempts to update his or her password to a known leaked password, the flow fails with an error, telling the user that his or her password is too weak. This ensures that no one can update their password with a leaked password.

  1. In your ReachFive Console, go to Settings  Security  Data Breach Detection.

  2. Under the Password Update section, toggle on the feature.

    dbd password updated

  3. Don’t forget to Save your input.