Hashed Credentials API
Check compromise status for a username/password combination using a secure, k-anonymity hash-based approach
Step 1 – Retrieve the Account Salt and Hashes
This is the first step to check if a username/password combination is compromised. This call will return an account-specific salt value, as well as a list of required password hashes which must be calculated locally.
The Enzoic API uses a basic auth scheme where the username is your API key and the password is your API secret.
See https://docs.enzoic.com/enzoic-api-developer-documentation/using-the-enzoic-api#api-authentication for more details.
The email or SHA-256 hash of the lowercased email you wish to check credentials for
[email protected]The username was found in the Enzoic database and the response contains the user-specific salt value and an array of password hashes which must be calculated for a subsequent Credentials API call.
The username was not found in the Enzoic database and has no compromised credentials associated with it. No further action is necessary.
Step 2 – Calculate the Requested Password Hashes
Step 3 – Calculate the Credential Hashes
Step 4 – Make the Credentials API Call
Retrieve all Credentials Hashes in the Enzoic database that match a list of partial Credentials Hashes
Returns a list of Credentials Hashes in the Enzoic database matching a provided list of partial Credentials Hashes
The Enzoic API uses a basic auth scheme where the username is your API key and the password is your API secret.
See https://docs.enzoic.com/enzoic-api-developer-documentation/using-the-enzoic-api#api-authentication for more details.
A list of the first 10 hex characters of Argon2 Credential Hashes passed in
partialHashes=9d5e070553&partialHashes=12c3979438One or more candidate credentials matches were found in Enzoic’s database of compromised credentials. The candidate hashes are returned in the response body. You should compare the full hash(es) to the list of returned candidates. If a match is found, the credentials are compromised.
The credentials were not found in Enzoic’s database and have not been compromised.
Test Accounts
Test AccountsLast updated
Was this helpful?