If enabled for a user, prevents email 2fa from being disabled
For new installs add a "User has compromised password" user-group, and update the "User-group for compromised passwords" option to use it
Align defaults with NIST Password Guidelines for 2024
Update "New password validation rules" defaults. "Prevent passwords which contain the user's email or username, and the site's domain/name" defaults to true
Fix changing user entity while a write is pending in some cases
Add "Use rejected password fragments in password meter" option (default disabled).
Take rejected password fragments into consideration when showing the password strength meter to the user. Security note: this makes the full list of rejected password fragments visible to end users; ensure that there aren't any sensitive password fragments before enabling.
Add new "User-group for compromised passwords" option, which adds uses to the selected user-group when it is detected they have a compromised password on login.
Defaults to disabled. Useful for targeting with notices