Skip to content

Commit

Permalink
Resolve #691
Browse files Browse the repository at this point in the history
  • Loading branch information
tghosth committed Dec 26, 2019
1 parent d087c46 commit 965b045
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions 4.0/en/0x11-V2-Authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,8 +42,8 @@ Credential service providers (CSPs) provide federated identity for users. Users
| :---: | :--- | :---: | :---:| :---: | :---: | :---: |
| **2.1.1** | Verify that user set passwords are at least 12 characters in length. ([C6](https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Formal_Numbering)) |||| 521 | 5.1.1.2 |
| **2.1.2** | Verify that passwords 64 characters or longer are permitted. ([C6](https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Formal_Numbering)) |||| 521 | 5.1.1.2 |
| **2.1.3** | Verify that passwords can contain spaces and truncation is not performed. Consecutive multiple spaces MAY optionally be coalesced. ([C6](https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Formal_Numbering)) |||| 521 | 5.1.1.2 |
| **2.1.4** | Verify that Unicode characters are permitted in passwords. A single Unicode code point is considered a character, so 12 emoji or 64 kanji characters should be valid and permitted. |||| 521 | 5.1.1.2 |
| **2.1.3** | Verify that password truncation is not performed. However, consecutive multiple spaces may be replaced by a single space. ([C6](https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Formal_Numbering)) |||| 521 | 5.1.1.2 |
| **2.1.4** | Verify that any printable Unicode character, including language neutral characters such as spaces and Emojis are permitted in passwords. |||| 521 | 5.1.1.2 |
| **2.1.5** | Verify users can change their password. |||| 620 | 5.1.1.2 |
| **2.1.6** | Verify that password change functionality requires the user's current and new password. |||| 620 | 5.1.1.2 |
| **2.1.7** | Verify that passwords submitted during account registration, login, and password change are checked against a set of breached passwords either locally (such as the top 1,000 or 10,000 most common passwords which match the system's password policy) or using an external API. If using an API a zero knowledge proof or other mechanism should be used to ensure that the plain text password is not sent or used in verifying the breach status of the password. If the password is breached, the application must require the user to set a new non-breached password. ([C6](https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Formal_Numbering)) |||| 521 | 5.1.1.2 |
Expand Down

0 comments on commit 965b045

Please sign in to comment.