Okta Breached Password Detection

Okta recently made its Breached Password Detection Functionality generally available. This functionality is enabled by default. If your user’s credentials appear in a list, Okta notifies you by recording the security.breached_credential.detected event in the System Log.

By default, Okta expires the user’s credentials and requires the user to reset their password the next time they attempt to sign in with their username and password. Additionally, this event can be used to trigger a Workflow or action in a downstream SOAR platform. Detailed instructions for configuring a workflow are available in

2 thoughts on “Okta Breached Password Detection

  1. Correct me if I am wrong, but I believe this Workflow and EventType will only be applicable to Okta-sourced users with passwords created in Okta. AD-sourced or LDAP-sourced users will not be identified with this event type, right?

    1. Directory Sourced Users (AD/LDAP) even with delegated Authentication if they put the username/password into Okta can trigger this messaging. You can even see the note linked on the documentation page “For AD-sourced users to reset their password after entering a breached password, you need to enable self-service password reset in your org.”

Leave a Reply