Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in
Deleted user
0 / 0 points
Next:
badges earned

Your Points Tracker
Challenges
Leaderboard
  • Global
  • Feed

Badge for your thoughts?

You're enrolled in our new beta rewards program. Join our group to get the inside scoop and share your feedback.

Join group
Recognition
Give the gift of kudos
You have 0 kudos available to give
Who do you want to recognize?
Why do you want to recognize them?
Kudos
Great job appreciating your peers!
Check back soon to give more kudos.

Past Kudos Given
No kudos given
You haven't given any kudos yet. Share the love above and you'll see it here.

It's not the same without you

Join the community to find out what other Atlassian users are discussing, debating and creating.

Atlassian Community Hero Image Collage

How to Implement LDAP Password Policy to CROWD?

Hi guys, i want to ask if how can i implement the password policy in ldap using crowd? i try adding a password policy in ldap but the crowd cannot read the password policy and there is no error showing.

2 answers

0 votes
AnnWorley Atlassian Team Nov 02, 2017

Hello,

If you set a password complexity requirement in LDAP, members of the LDAP connected User Directory in Crowd will be constrained to the requirement you set.

Crowd doesn't read the policy, it just sends the password reset request to LDAP, and LDAP enforces the complexity policy. LDAP will not allow a password that does not adhere to the policy just because the request comes from Crowd.

In case you had not seen it, I wanted to share this article because it has a lot of interesting information about the way Crowd interacts with the different implementations of LDAP: Configuring an LDAP Directory Connector

Thanks,

Ann

Hello,

I tried change user password restricted on the "Password Policy" in LDAP directory on Crowd.

  • Crowd: Atlassian Crowd Version: 3.4.5 (Build:#1070 - 2019-05-23)
  • LDAP : @(#) $OpenLDAP: slapd 2.4.44 (Jul 27 2018 21:48:56) $ from openldap-servers-2.4.44-15.amzn2.x86_64
  • Password Policy module: ppolicy-2.4.so.2.10.7

From "ldappasswd" command on localhost(LDAP server), password policy is available and I can not use(change) invalid password. But from Crowd, I can use(change) invalid password.

  • Password: test1234 => test1234
    • ldappasswd: NG (Constraint violation (19) Additional info: Password is not being changed from existing value)
    • Crowd : OK

According to OpenLDAP server log, Crowd sends not "PASSMOD" but "MOD" request to change user password field. OpenLDAP server and password policy module don't look password policy in case receiving "MOD" request.

from ldappasswd:

Jun 27 16:27:30 ip-10-40-65-124 slapd[2487]: conn=1067 op=1 EXT oid=1.3.6.1.4.1.4203.1.11.1
Jun 27 16:27:30 ip-10-40-65-124 slapd[2487]: conn=1067 op=1 PASSMOD id="cn=test,ou=Users,dc=example,dc=com" old new
Jun 27 16:27:30 ip-10-40-65-124 slapd[2487]: conn=1067 op=1 RESULT oid= err=19 text=Password is not being changed from existing value

from Crowd:

Jun 27 16:30:51 ip-10-40-65-124 slapd[2487]: conn=1010 op=60 MOD dn="cn=test,ou=Users,dc=example,dc=com"
Jun 27 16:30:51 ip-10-40-65-124 slapd[2487]: conn=1010 op=60 MOD attr=userPassword
Jun 27 16:30:51 ip-10-40-65-124 slapd[2487]: conn=1010 op=60 RESULT tag=103 err=0 text=

I hope Crowd sends "PASSMOD" instead of "MOD" request to change user password field.
(See also: https://github.com/LDAPAccountManager/lam/issues/26)

Jira sends MOD and not PASSMOD.

Maybe Atlassian wants to hash the password on the client side. This prevents LDAP password policies.

From the OpenLDAP documentation:

pwdCheckQuality

This attribute indicates if and how password syntax will be checked
while a password is being modified or added. If this attribute is not
present, or its value is zero (0), no syntax checking will be done. If
its value is one (1), the server will check the syntax, and if the
server is unable to check the syntax, whether due to a client-side
hashed password or some other reason, it will be accepted. If its value
is two (2), the server will check the syntax, and if the server is
unable to check the syntax it will return an error refusing the
password.

 

The LDAP password policy is enforced by the LDAP server. It is not an informational record for a client application like Crowd.

If the LDAP server should enforce the password policy, the LDAP server needs to know the password. This means Crowd must write the password in PLAINTEXT to the LDAP server. In order to prevent, that the password gets written unencrypted to the database, you have to set in the ppolicy overlay of OpenLDAP the following attribute:

olcPPolicyHashCleartext: TRUE

But be warned. At least Jira generates extremly ugly error messages, if the LDAP server rejects the password, because it does not fulfill the requirements. See here:

https://community.atlassian.com/t5/Jira-questions/Dialog-box-when-LDAP-password-policy-rejects-password/qaq-p/1315744

Suggest an answer

Log in or Sign up to answer
TAGS
Community showcase
Published in Jira Service Management

JSM June Challenge #2: Share how your business teams became ITSM rockstars

For JSM June Challenge #2, share how your non-technical teams like HR, legal, marketing, finance, and beyond started using Jira Service Management! Tell us: Did they ask to start using it or...

307 views 9 7
Read article

Community Events

Connect with like-minded Atlassian users at free events near you!

Find an event

Connect with like-minded Atlassian users at free events near you!

Unfortunately there are no Community Events near you at the moment.

Host an event

You're one step closer to meeting fellow Atlassian users at your local event. Learn more about Community Events

Events near you