Hi guys, i want to ask if how can i implement the password policy in ldap using crowd? i try adding a password policy in ldap but the crowd cannot read the password policy and there is no error showing.
If you set a password complexity requirement in LDAP, members of the LDAP connected User Directory in Crowd will be constrained to the requirement you set.
Crowd doesn't read the policy, it just sends the password reset request to LDAP, and LDAP enforces the complexity policy. LDAP will not allow a password that does not adhere to the policy just because the request comes from Crowd.
In case you had not seen it, I wanted to share this article because it has a lot of interesting information about the way Crowd interacts with the different implementations of LDAP: Configuring an LDAP Directory Connector
I tried change user password restricted on the "Password Policy" in LDAP directory on Crowd.
From "ldappasswd" command on localhost(LDAP server), password policy is available and I can not use(change) invalid password. But from Crowd, I can use(change) invalid password.
According to OpenLDAP server log, Crowd sends not "PASSMOD" but "MOD" request to change user password field. OpenLDAP server and password policy module don't look password policy in case receiving "MOD" request.
Jun 27 16:27:30 ip-10-40-65-124 slapd: conn=1067 op=1 EXT oid=220.127.116.11.4.1.418.104.22.168
Jun 27 16:27:30 ip-10-40-65-124 slapd: conn=1067 op=1 PASSMOD id="cn=test,ou=Users,dc=example,dc=com" old new
Jun 27 16:27:30 ip-10-40-65-124 slapd: conn=1067 op=1 RESULT oid= err=19 text=Password is not being changed from existing value
Jun 27 16:30:51 ip-10-40-65-124 slapd: conn=1010 op=60 MOD dn="cn=test,ou=Users,dc=example,dc=com"
Jun 27 16:30:51 ip-10-40-65-124 slapd: conn=1010 op=60 MOD attr=userPassword
Jun 27 16:30:51 ip-10-40-65-124 slapd: conn=1010 op=60 RESULT tag=103 err=0 text=
I hope Crowd sends "PASSMOD" instead of "MOD" request to change user password field.
(See also: https://github.com/LDAPAccountManager/lam/issues/26)
Jira sends MOD and not PASSMOD.
Maybe Atlassian wants to hash the password on the client side. This prevents LDAP password policies.
From the OpenLDAP documentation:
This attribute indicates if and how password syntax will be checked
while a password is being modified or added. If this attribute is not
present, or its value is zero (0), no syntax checking will be done. If
its value is one (1), the server will check the syntax, and if the
server is unable to check the syntax, whether due to a client-side
hashed password or some other reason, it will be accepted. If its value
is two (2), the server will check the syntax, and if the server is
unable to check the syntax it will return an error refusing the
The LDAP password policy is enforced by the LDAP server. It is not an informational record for a client application like Crowd.
If the LDAP server should enforce the password policy, the LDAP server needs to know the password. This means Crowd must write the password in PLAINTEXT to the LDAP server. In order to prevent, that the password gets written unencrypted to the database, you have to set in the ppolicy overlay of OpenLDAP the following attribute:
But be warned. At least Jira generates extremly ugly error messages, if the LDAP server rejects the password, because it does not fulfill the requirements. See here:
For JSM June Challenge #2, share how your non-technical teams like HR, legal, marketing, finance, and beyond started using Jira Service Management! Tell us: Did they ask to start using it or...
Connect with like-minded Atlassian users at free events near you!Find an event
Connect with like-minded Atlassian users at free events near you!
Unfortunately there are no Community Events near you at the moment.Host an event
You're one step closer to meeting fellow Atlassian users at your local event. Learn more about Community Events