freeipa-password-reset icon indicating copy to clipboard operation
freeipa-password-reset copied to clipboard

Follow Password Policy

Open fsadoon opened this issue 5 years ago • 10 comments

First, thanks for your magnificent work !! one small thing while testing, users are setting there passwords without following password policy i know this is something related to ldap-passwd-reset user account, any idea how to fix this ?

Regards

fsadoon avatar Feb 11 '20 17:02 fsadoon

Any Idea ? :(

fsadoon avatar Feb 12 '20 10:02 fsadoon

Hello.
I will check it latter, now a lot of work.

larrabee avatar Feb 12 '20 11:02 larrabee

Sorry, I have the same problem, did you have a solution??

fafa1681 avatar Mar 24 '20 16:03 fafa1681

Any Idea ? :(

Hi, Have you found a solution?

fafa1681 avatar Mar 30 '20 13:03 fafa1681

Sorry bro, didn't see your comment ,

I did find a solution with another project called " PWM " try it out

fsadoon avatar Apr 04 '20 17:04 fsadoon

great, thanks bro!!

fafa1681 avatar Apr 06 '20 13:04 fafa1681

Any time .. you will faca an issue with the SSL certificate if u use the docker image , they promised they will fix it, IDK if they did

fsadoon avatar Apr 06 '20 15:04 fsadoon

I'm coming across this same issue. I'd like to implement this into the Production environment, but know it wont pass security without complying to our password policy. Currently, you can reset your LDAP password to whatever you want. Length, complexity don't apply.

I see this has sat for about a year. Any chance there will be a fix to this issue? Seems like it's a small fix to what looks like a wonderful solution to a self-service problem.

Thanks

jpurtell1 avatar Mar 26 '21 16:03 jpurtell1

I addressed the password policy issues with a "work around". I put the policy rules in the javascript that was already checking to make sure the new password matched. I just expanded it to include a minimum length check and a regex to ensure upper, lower, alpha-numeric and special characters are being used in the new password. If any of these checks fail, a message is displayed explaining the requirements and if the passwords didn't match. As originally written.

I've pasted the java script below, and attached the 'setpassword.html' file for anyone to grab and implement into their environment for testing.

Cheers! JP

setpassword.html.txt

/opt/data/IPAPasswordReset/PasswordReset/app/templates/setpassword.html

jpurtell1 avatar Mar 31 '21 18:03 jpurtell1

I addressed the password policy issues with a "work around". I put the policy rules in the javascript that was already checking to make sure the new password matched. I just expanded it to include a minimum length check and a regex to ensure upper, lower, alpha-numeric and special characters are being used in the new password. If any of these checks fail, a message is displayed explaining the requirements and if the passwords didn't match. As originally written.

I've pasted the java script below, and attached the 'setpassword.html' file for anyone to grab and implement into their environment for testing.

Cheers! JP

setpassword.html.txt

/opt/data/IPAPasswordReset/PasswordReset/app/templates/setpassword.html

i used this, works like a charm

exeq89 avatar Dec 22 '23 14:12 exeq89