
uajg5 (uajg5) asked a question.
NIST has a requirement to not allow passwords that have previously been breached. Is there a way to implement this into Okta?
```
When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised. For example, the list MAY include, but is not limited to:
- Passwords obtained from previous breach corpuses.
```

Thank you for posting your question on the Okta Community. We have a feature to check the commonly used passwords which is an Early access feature and checks to ensure that passwords are not too weak based on a list of the most commonly used passwords. This needs to be enabled in your password policy in Okta. I would recommend you to open a case with Okta Support to have this feature enabled for your org. You can refer to our documentation for more information: https://help.okta.com/en/prod/Content/Topics/Security/Security_Policies.htm#Configur