You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
Hi guys, i want to ask if how can i implement the password policy in ldap using crowd? i try adding a password policy in ldap but the crowd cannot read the password policy and there is no error showing.
The LDAP password policy is enforced by the LDAP server. It is not an informational record for a client application like Crowd.
If the LDAP server should enforce the password policy, the LDAP server needs to know the password. This means Crowd must write the password in PLAINTEXT to the LDAP server. In order to prevent, that the password gets written unencrypted to the database, you have to set in the ppolicy overlay of OpenLDAP the following attribute:
But be warned. At least Jira generates extremly ugly error messages, if the LDAP server rejects the password, because it does not fulfill the requirements. See here:
If you set a password complexity requirement in LDAP, members of the LDAP connected User Directory in Crowd will be constrained to the requirement you set.
Crowd doesn't read the policy, it just sends the password reset request to LDAP, and LDAP enforces the complexity policy. LDAP will not allow a password that does not adhere to the policy just because the request comes from Crowd.
In case you had not seen it, I wanted to share this article because it has a lot of interesting information about the way Crowd interacts with the different implementations of LDAP: Configuring an LDAP Directory Connector
I tried change user password restricted on the "Password Policy" in LDAP directory on Crowd.
From "ldappasswd" command on localhost(LDAP server), password policy is available and I can not use(change) invalid password. But from Crowd, I can use(change) invalid password.
According to OpenLDAP server log, Crowd sends not "PASSMOD" but "MOD" request to change user password field. OpenLDAP server and password policy module don't look password policy in case receiving "MOD" request.
Jun 27 16:27:30 ip-10-40-65-124 slapd: conn=1067 op=1 EXT oid=220.127.116.11.4.1.418.104.22.168
Jun 27 16:27:30 ip-10-40-65-124 slapd: conn=1067 op=1 PASSMOD id="cn=test,ou=Users,dc=example,dc=com" old new
Jun 27 16:27:30 ip-10-40-65-124 slapd: conn=1067 op=1 RESULT oid= err=19 text=Password is not being changed from existing value
Jun 27 16:30:51 ip-10-40-65-124 slapd: conn=1010 op=60 MOD dn="cn=test,ou=Users,dc=example,dc=com"
Jun 27 16:30:51 ip-10-40-65-124 slapd: conn=1010 op=60 MOD attr=userPassword
Jun 27 16:30:51 ip-10-40-65-124 slapd: conn=1010 op=60 RESULT tag=103 err=0 text=
I hope Crowd sends "PASSMOD" instead of "MOD" request to change user password field.
(See also: https://github.com/LDAPAccountManager/lam/issues/26)
Jira sends MOD and not PASSMOD.
Maybe Atlassian wants to hash the password on the client side. This prevents LDAP password policies.
From the OpenLDAP documentation:
This attribute indicates if and how password syntax will be checked
while a password is being modified or added. If this attribute is not
present, or its value is zero (0), no syntax checking will be done. If
its value is one (1), the server will check the syntax, and if the
server is unable to check the syntax, whether due to a client-side
hashed password or some other reason, it will be accepted. If its value
is two (2), the server will check the syntax, and if the server is
unable to check the syntax it will return an error refusing the