Dear developers,
SOGo offers parameter userPasswordPolicy when authentication using SQL:
https://www.sogo.nu/files/docs/SOGoInstallationGuide.html#Authentication-using-SQL
It supports:
- Minimum of 1 lowercase letter
- Minimum of 1 uppercase letter
- Minimum of 1 digit
- Minimum of 2 special symbols
- Minimum length of 8 characters
But with LDAP, it offers parameter passwordPolicy which relies on LDAP Password Policies attributes, the most importantly, it's different than what userPasswordPolicy does.
Quote from OpenLDAP Administrator's Guide (https://www.openldap.org/doc/admin26/overlays.html#Password%20Policies):
The key abilities of the password policy overlay are as follows:
- Enforce a minimum length for new passwords
- Make sure passwords are not changed too frequently
- Cause passwords to expire, provide warnings before they need to be changed, and allow a fixed number of 'grace' logins to allow > 4. them to be changed after they have expired
- Maintain a history of passwords to prevent password re-use
- Prevent password guessing by locking a password for a specified period of time after repeated authentication failures
- Force a password to be changed at the next authentication
- Set an administrative lock on an account
- Support multiple password policies on a default or a per-object basis.
- Perform arbitrary quality checks using an external loadable module. This is a non-standard extension of the draft RFC.
As you can see, they're totally different and only first rule is supported by SQL userPasswordPolicy .
So the request is, can we support userPasswordPolicy when authenticating using LDAP? |