README.md in devise_zxcvbn-0.0.1 vs README.md in devise_zxcvbn-1.0.0

- old
+ new

@@ -1,10 +1,14 @@ # devise_zxcvbn +[![Gem Version](https://badge.fury.io/rb/devise_zxcvbn.png)](http://badge.fury.io/rb/devise_zxcvbn) + Plugin for devise to reject weak passwords, using [zxcvbn-ruby](https://github.com/envato/zxcvbn-ruby) which is a ruby port of [zxcvbn: realistic password strength estimation](https://tech.dropbox.com/2012/04/zxcvbn-realistic-password-strength-estimation/). The user's password will be rejected if the score is below 4 by default. It also uses the email as user input to zxcvbn, to downscore passwords containing the email. +The scores 0, 1, 2, 3 or 4 are given when the estimated crack time (seconds) is less than 10**2, 10**4, 10**6, 10**8, Infinity. + ## Installation Add this line to your application's Gemfile: gem 'devise_zxcvbn' @@ -14,22 +18,26 @@ class User < ActiveRecord::Base devise :database_authenticatable, :zxcvbnable end -Default parameters +### Default parameters +A score of less than 3 is not recommended. + Devise.setup do |config| - config.min_password_score = 4 # 0, 1, 2, 3 or 4 + config.min_password_score = 4 end ### Error Message +Example error message, the `score` and `min_password_score` variables are also passed through if you need them. + # config/locale/devise.en.yml en: errors: messages: - weak_password: "not strong enough. It scored %{score}. It must score at least %{min_password_score}." + weak_password: "not strong enough. Consider adding a number, symbols or more letters to make it stronger" ## Contributing 1. Fork it