CIAM
Consumer account takeover (ATO) starts with credentials attackers already have. The SpyCloud Auth Node for PingOne Advanced Identity Cloud and PingAM brings credential exposure intelligence natively into your consumer authentication journeys — checking whether a user’s credentials have been exposed at login, registration, or password change, and routing automatically to the right response before authentication completes. No custom development required.
The SpyCloud Auth Node is a native Journey Node for PingOne Advanced Identity Cloud and PingAM. Drag it into any existing journey at the point where you want the exposure check to occur, typically after credentials are collected. The node reads the user identifier from the shared state, queries the SpyCloud Consumer Threat Protection API, and returns one of three outcomes: Compromised, Not Compromised, or Error. Each outcome branches the journey to your configured response — step-up MFA, forced password reset, access block, or fraud team alert — with no manual intervention required.
Where the SpyCloud Auth Node is placed, the node reads a user identifier from the journey’s shared state — typically the user’s email address — and sends it to the SpyCloud Consumer Threat Protection API. SpyCloud checks the identifier against its recaptured database and returns a result indicating whether the user’s credentials have been exposed. The node returns three possible outcomes: