Login

Safeguard your user’s digital identities

Protect your users' credentials with rigorous checks, proactive alerts, and unmatched security.

Hack of streaming service Twitch reveals payment info of top users.

CBC

GoDaddy says data breach exposed over a million user accounts.

TechCrunch

Criminals acquired the personal data of almost 50 million T-Mobile consumers.

Consumer Reports

Third-party breaches cast a shadow

Data breaches are an everyday reality. Traditional recovery steps spring into action only when the breach surfaces in the public domain. By then, the damage is done. With Auth0, transition from a reactive stance to proactive defense.

Breached Password Detection docs

How Auth0 shields your user’s identities

Auth0 helps eliminate the costs associated with account takeovers and protect your users with three simple steps:

Proactive Protection

The moment a user's login credentials match any known third-party breach, we sound the alarm. Both you and your users are alerted instantly.

Active Prevention

A breached account doesn't stay open for misuse. We lock it down, prompting users to refresh their passwords and increase their defenses with Multi-Factor Authentication (MFA).

Personalization

Your brand voice remains consistent, even in alerts. Tailor the content and design of breach warning emails to resonate with your user base.

Elevate your security with Credential Guard

Harness our extensive database of compromised assets to fortify your defense against large-scale account takeover threats.

Worldwide vigilance

Spread the security net across 200+ countries and territories. If a compromised credential tries to gain access, we're on it — blocking and alerting.

Instant threat neutralization

When a breach occurs, we go into action, identifying potential account takeover threats and initiating instant password resets.

Specialized security brigade

Meet our digital watchmen. Our dedicated team of security experts dive deeper, uncovering threats that automated scanners might miss.

Breached Password Detection

Keep users safe from account hackers using stolen passwords from published security breaches.

Credential Guard

Protect high value accounts from takeover attempts by detecting and resetting stolen passwords as soon as possible based on data received from the dark web.

Plans included

B2B / B2C Professional and Enterprise

Part of Attack Protection add-on in Enterprise plan

Data collection method

Web scanners and scrapers search for user credentials in published security breaches

Dedicated security team to infiltrate criminal communities and gain access to breach data that isn’t available otherwise

Typical detection time

Up to 7 - 13 months

12 - 36 hours

Recommended use

Self-service accounts, testing scenarios

Enterprise, production environments, high value accounts

Coverage

English only

200+ countries and territories

Breached Password Detection

Credential Guard

Keep users safe from account hackers using stolen passwords from published security breaches.

Plans included

B2B / B2C Professional and Enterprise

Data collection method

Web scanners and scrapers search for user credentials in published security breaches

Typical detection time

Up to 7 - 13 months

Recommended use

Self-service accounts, testing scenarios

Coverage

English only

Ready to dive in?

Protect your users and your business from third-party breach risks with Breached Password Detection and Credential Guard.