From d40fb0af88e0826e212d0fa8f85a1070e2489999 Mon Sep 17 00:00:00 2001 From: Mitar Date: Tue, 7 Dec 2021 23:55:14 -0800 Subject: [PATCH] docs: Levenshtein-Distance has been released (#2040) --- docs/docs/concepts/security.mdx | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/docs/docs/concepts/security.mdx b/docs/docs/concepts/security.mdx index dc5433ae1d48..f68c5fd8982c 100644 --- a/docs/docs/concepts/security.mdx +++ b/docs/docs/concepts/security.mdx @@ -267,8 +267,7 @@ Ory Kratos implements a password policy that: - Checks if a password has previously been leaked using the [HIBP API](https://haveibeenpwned.com/API/v2), -- Checks if a password is too similar to one of the identifiers (in a future - release [kratos#184](https://github.com/ory/kratos/issues/184)), +- Checks if a password is too similar to one of the identifiers, - Does not expire passwords. This is a rundown of all the practices Ory Kratos implements and why. **Some