Found 21 packages
C#/.NET port of Dan Wheeler/DropBox's Zxcvbn JS password strength estimation library. Updated for .Net Core.
Checks the strength of a password
.NET package to check the password strength of a certain passphrase. A password strength checker based from RegEx (Regulax Expression).
This project was created to provide an easy to use and configurable password validation library. If the default configuration is sufficient for your needs the library can be used out of the box without further setup. However, if you have specific validation needs you can alter the library configuration settings and also provide custom validation methods. There are two parts to this library: score checking and validation testing. Testing a password will perform both actions. The score checking will provide an overall score to a password which is the sum of all test scores. The validation testing will return whether a password passed or failed the tests.
Password Strength Indicator somewhat similar to ASP.NET AJAX PasswordStrength extender control behavior Available Features: Password setting are stored in xml file, Client side and server side validation, Password strength in different colors, Check if password contains x number of Uppercase characters (A-Z), Check if password contains any Lowercase characters (a-z), Check if password contains x number of Base 10 digits (0 through 9), Check if password contains x number of allowable Nonalphanumeric characters, Check if password meet the Minimum and Maximum password length requirement, Check if password exceeded the allowable Maximum consecutive repeated character, Check if password contains keyboard sequence (i.e., 123456, qwerty, …)
.NET wrapper for the Dropbox zxcvbn password strength estimator
PasswordUtility, as the name implies, is a lightweight password utility class that allows you to create random passwords based on certain criteria and validate password strength. The library is loosely based on the OSS KeePass code but was altered for my specific needs
Password Strength is a simple tool for checking the strength of a password. It returns the strength of the password based on various factors.
Port of Dropbox's Zxcvbn in C#
Password strength checker component for .NET
C#/.NET Zxcvbn JS password strength estimation library. A fork of zxcvbn-cs by trichards57 that restores entropy
Owasp Password Strength Test (owasp-password-strength-test) binding library for Bridge.NET projects.
ASP.NET Core Identity IPasswordHasher implementation backed by libsodium Argon2id. Supports configurable opslimit/memlimit or strength presets through NetDevPack builder options. Detects ASP.NET Identity v2/v3 hashes and rehashes them to Argon2id after successful verification.
Pesto is a secure password strength estimator blending features from zxcvbn and Azure AD Password Protection used for sensitive applications that require mutable data structures.
.NET Standard 2.0 port of Michael Ford/Dan Wheeler/DropBox's Zxcvbn js password strength estimation library
Package Description
Password Predicate is used for checking if a string complies with the given requirements. It is meant for checking password strings. It does not encrypt or decrypt the password and does not return a password strength. BUT IT DOES OFFER: - setting the minimum and maximum password length, - setting required upper case letter count, - setting required lower case letter count, - setting required digit count and - setting required special character count. ON TOP OF THAT IT ALSO OFFERS: - setting a list of words (strings) that must not be used in password, - finding these prohibited strings as substrings of the password, - finding these prohibited strings as subsequences of the password. - both substring and subsequence search can be turned on or off and - match prohibited string case can also be turned on or off. Password string must not be null and must not contain backslash (\).
ASP.NET Core Identity IPasswordHasher implementation using libsodium scrypt. Offers strength presets and custom opslimit/memlimit settings through NetDevPack builder options. Detects ASP.NET Identity v2/v3 hashes and promotes them to scrypt after successful verification.
Fable bindings for the zxcvbn password strength library
This package include a custom implementation of ActiveDirectoryMembershipProvider which allowes for caching and return of displayname. It also includes a RoleProvider leveraging LDAP group as roles (lacks support for adding and deleting roles). Configuration for the provider, read http://msdn.microsoft.com/en-us/library/system.web.security.activedirectorymembershipprovider.aspx for more info <add name="DirectoryServicesMembershipProvider" type="ASystems.DirectoryServicesProviders.DirectoryServicesMembershipProvider, ASystems.DirectoryServicesProviders" connectionStringName="ADService" connectionUsername="UserWithAppropriateRights" <!-- remove for apppool credentials --> connectionPassword="PasswordForUser" <!-- remove for apppool credentials --> connectionProtection="Secure" <-- Secure, None --> cache="15" <!-- minutes to cache, 0 to disable caching --> allowedRoles="" <!-- comma separated string with groups, or name of appsetting containing the comma separated groups --> enableUpdate="true" enablePasswordReset="true" enableSearchMethods="true" requiresQuestionAndAnswer="true" applicationName="/" description="Default AD connection" requiresUniqueEmail="false" clientSearchTimeout="30" serverSearchTimeout="30" attributeMapPasswordQuestion="department" attributeMapPasswordAnswer="division" attributeMapFailedPasswordAnswerCount="singleIntAttribute" attributeMapFailedPasswordAnswerTime="singleLargeIntAttribute" attributeMapFailedPasswordAnswerLockoutTime="singleLargeIntAttribute" attributeMapEmail = "mail" attributeMapUsername = "userPrincipalName" <!-- userPrincipalName, sAMAccountName --> attributeMapProviderUserKey = "objectSid" <!-- objectSid, objectGUID --> additionalAttributes = "" <!-- comma separated string with attributes that are included in search results --> maxInvalidPasswordAttempts = "5" mergeWith="NameOfMembershipProvider" <!-- use to combine users from multiple providers --> mergeStyle="After" <!-- After, Before --> passwordAttemptWindow = "10" passwordAnswerAttemptLockoutDuration = "30" minRequiredPasswordLength="7" minRequiredNonalphanumericCharacters="1" passwordStrengthRegularExpression="@\"(?=.{6,})(?=(.*\d){1,})(?=(.*\W){1,})"" /> <add name="DirectoryServicesRoleProvider" type="ASystems.DirectoryServicesProviders.DirectoryServicesRoleProvider, ASystems.DirectoryServicesProviders" connectionStringName="ADService" connectionUsername="UserWithAppropriateRights" <!-- remove for apppool credentials --> connectionPassword="PasswordForUser" <!-- remove for apppool credentials --> connectionProtection="Secure" <-- Secure, None --> cache="15" <!-- minutes to cache, 0 to disable caching --> useOrganisationalUnits="false" <!-- use organisational units as role instead of groups --> mergeWith="NameOfRoleProvider" <!-- use to combine roles from multiple providers --> mergeStyle="After" <!-- After, Before, Mixed --> applicationName="/" attributeMapUsername = "userPrincipalName" <!-- userPrincipalName, sAMAccountName --> />