Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in
Celebration

Earn badges and make progress

You're on your way to the next level! Join the Kudos program to earn points and save your progress.

Deleted user Avatar
Deleted user

Level 1: Seed

25 / 150 points

Next: Root

Avatar

1 badge earned

Collect

Participate in fun challenges

Challenges come and go, but your rewards stay with you. Do more to earn more!

Challenges
Coins

Gift kudos to your peers

What goes around comes around! Share the love by gifting kudos to your peers.

Recognition
Ribbon

Rise up in the ranks

Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!

Leaderboard

Come for the products,
stay for the community

The Atlassian Community can help you and your team get more value out of Atlassian products and practices.

Atlassian Community about banner
4,458,177
Community Members
 
Community Events
176
Community Groups

How to Implement LDAP Password Policy to CROWD?

Hi guys, i want to ask if how can i implement the password policy in ldap using crowd? i try adding a password policy in ldap but the crowd cannot read the password policy and there is no error showing.

2 answers

The LDAP password policy is enforced by the LDAP server. It is not an informational record for a client application like Crowd.

If the LDAP server should enforce the password policy, the LDAP server needs to know the password. This means Crowd must write the password in PLAINTEXT to the LDAP server. In order to prevent, that the password gets written unencrypted to the database, you have to set in the ppolicy overlay of OpenLDAP the following attribute:

olcPPolicyHashCleartext: TRUE

But be warned. At least Jira generates extremly ugly error messages, if the LDAP server rejects the password, because it does not fulfill the requirements. See here:

https://community.atlassian.com/t5/Jira-questions/Dialog-box-when-LDAP-password-policy-rejects-password/qaq-p/1315744

0 votes
AnnWorley Atlassian Team Nov 02, 2017

Hello,

If you set a password complexity requirement in LDAP, members of the LDAP connected User Directory in Crowd will be constrained to the requirement you set.

Crowd doesn't read the policy, it just sends the password reset request to LDAP, and LDAP enforces the complexity policy. LDAP will not allow a password that does not adhere to the policy just because the request comes from Crowd.

In case you had not seen it, I wanted to share this article because it has a lot of interesting information about the way Crowd interacts with the different implementations of LDAP: Configuring an LDAP Directory Connector

Thanks,

Ann

Hello,

I tried change user password restricted on the "Password Policy" in LDAP directory on Crowd.

  • Crowd: Atlassian Crowd Version: 3.4.5 (Build:#1070 - 2019-05-23)
  • LDAP : @(#) $OpenLDAP: slapd 2.4.44 (Jul 27 2018 21:48:56) $ from openldap-servers-2.4.44-15.amzn2.x86_64
  • Password Policy module: ppolicy-2.4.so.2.10.7

From "ldappasswd" command on localhost(LDAP server), password policy is available and I can not use(change) invalid password. But from Crowd, I can use(change) invalid password.

  • Password: test1234 => test1234
    • ldappasswd: NG (Constraint violation (19) Additional info: Password is not being changed from existing value)
    • Crowd : OK

According to OpenLDAP server log, Crowd sends not "PASSMOD" but "MOD" request to change user password field. OpenLDAP server and password policy module don't look password policy in case receiving "MOD" request.

from ldappasswd:

Jun 27 16:27:30 ip-10-40-65-124 slapd[2487]: conn=1067 op=1 EXT oid=1.3.6.1.4.1.4203.1.11.1
Jun 27 16:27:30 ip-10-40-65-124 slapd[2487]: conn=1067 op=1 PASSMOD id="cn=test,ou=Users,dc=example,dc=com" old new
Jun 27 16:27:30 ip-10-40-65-124 slapd[2487]: conn=1067 op=1 RESULT oid= err=19 text=Password is not being changed from existing value

from Crowd:

Jun 27 16:30:51 ip-10-40-65-124 slapd[2487]: conn=1010 op=60 MOD dn="cn=test,ou=Users,dc=example,dc=com"
Jun 27 16:30:51 ip-10-40-65-124 slapd[2487]: conn=1010 op=60 MOD attr=userPassword
Jun 27 16:30:51 ip-10-40-65-124 slapd[2487]: conn=1010 op=60 RESULT tag=103 err=0 text=

I hope Crowd sends "PASSMOD" instead of "MOD" request to change user password field.
(See also: https://github.com/LDAPAccountManager/lam/issues/26)

Jira sends MOD and not PASSMOD.

Maybe Atlassian wants to hash the password on the client side. This prevents LDAP password policies.

From the OpenLDAP documentation:

pwdCheckQuality

This attribute indicates if and how password syntax will be checked
while a password is being modified or added. If this attribute is not
present, or its value is zero (0), no syntax checking will be done. If
its value is one (1), the server will check the syntax, and if the
server is unable to check the syntax, whether due to a client-side
hashed password or some other reason, it will be accepted. If its value
is two (2), the server will check the syntax, and if the server is
unable to check the syntax it will return an error refusing the
password.

 

Suggest an answer

Log in or Sign up to answer
TAGS

Atlassian Community Events