Le 01/09/2017 à 10:23, Sebastian Perkins - Hoist Group - Switzerland a écrit :

Hi everyone,


Hello Sebastian,

We have been using ssp since 8 months and all is great. However, we have to comply with some password rules from a major customer.

·Password complexity : that’s ok ssp handles that great

·Change password after x days : this is where things get tricky, we are thinking of

ousing ldap ppolicy extension just to “lockout” the account after X days

osending a reminder via email

ouser groans as he is locked out :D

ossp then is used as of today to change the password

·(ideally) password history is challenged (I know I know php-ldap…)

Excluding the password history bullet, is this ok with ssp ?


There is a difference between a locked password and an expired password, you can see it if you read the password policy draft.

In your case, it seems you are talking about password expiration. It is indeed managed by LDAP directory. You can find here a small script to send reminder by email if you need one: https://github.com/ltb-project/ldap-scripts/blob/master/checkLdapPwdExpiration.sh. There is also a PR to rewrite it in PHP: https://github.com/ltb-project/self-service-password/pull/139

If password is expired, user will not be able to change it (as old password will be rejected). He can reset it by mail or SMS.


Password history is next step discussion, I do remember an old thread to directly extract the ldap policy info…


Yes, there is also a PR on this subject: https://github.com/ltb-project/self-service-password/pull/101. It still need some work.


--
Clément OUDOT
Consultant en logiciels libres, Expert infrastructure et sécurité
Savoir-faire Linux
137 boulevard de Magenta - 75010 PARIS
Blog: http://sflx.ca/coudot

_______________________________________________
ltb-users mailing list
[email protected]
https://lists.ltb-project.org/cgi-bin/mailman/listinfo/ltb-users

Reply via email to