-
Notifications
You must be signed in to change notification settings - Fork 730
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add password policies for local users #2252
Comments
This change consists of two components: 1) enforcing the user to change his or her password every x days, when pwd_changed_at is not set or longer ago then specified only access to the password page is prohibited 2) enforce minimal length or complexity settings depending on selected choices
By default the policies will stay disabled in dc74006 so nothing should change for existing and new installs, other then some minor (non functional) cleanups in the authentication flow. |
This change consists of two components: 1) enforcing the user to change his or her password every x days, when pwd_changed_at is not set or longer ago then specified only access to the password page is prohibited 2) enforce minimal length or complexity settings depending on selected choices (cherry picked from commit dc74006)
Hello, is there a roadmap, when this feature would be available for the production release ? cu denny |
Hi Denny,
It was shipped in 18.1.6.
Cheers,
Franco
… On 13. Apr 2018, at 10:53, Denny Fuchs ***@***.***> wrote:
Hello,
is there a roadmap, when this feature would be available for the production release ?
cu denny
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub, or mute the thread.
|
hi @fichtner thanks :-) Is there a configuration file or a doc, what kind of complexity is used ? I mean, I can enable it but I can see (if the password is bad) the rule only on a password change :-) |
Set an expiry date on local passwords and enforce password strength when selected.
The text was updated successfully, but these errors were encountered: