David Paulsen <dave.paulsen@...> writes:

> 
> Kiran Ayyagari <kayyagari <at> ...> writes:
> 
> > 
> > On Fri, May 29, 2015 at 2:13 AM, David Paulsen <dave.paulsen <at> 
...>
> > wrote:
> > 
> > > I'm running in to a strange issue. I have two separate servers 
> running the
> > > official 2.0.0-M20 release. In one instance I can change the 
> password to
> > > anything I want (including the same password) when I bind to the
> > > connection using the built in admin user (dn=uid=admin,ou=system). 
> In
> > > another instance running the same version of the 2.0.0-M20 
release, 
> that
> > > exact same operation (again bound as admin user) results in the 
> following
> > > error: invalid reuse of password present in password history
> > >
> > you sure that this is happening during bind? this check is performed 
> only
> > while updating the password of a user (excluding admin user)
> > 
> > >
> > > It should never enforce the password policy for the admin user, 
> correct?
> > > Any idea what could be causing it to enforce the policy in one M20
> > > instance and not the other?
> > >
> > 
> > > Thanks!
> > >
> > >
> > 
> 
> Hi Kiran...
> 
> Right. It didn't happen during bind, it happened when I tried to 
update 
> the password to the same value after binding as the 
> dn=uid=admin,ou=system user.
> 
> 
I found a way to recreate this problem. I believe the issue is that when 
bound to a connection using the "uid=admin,ou=system" user, it enforces 
the ads-pwdInHistory in the password policy of the uid I'm changing the 
password for. For example, if I'm changing the password for 
uid=147547,ou=8300,ou=DVHead,dc=kewilltransport,dc=com, and that uid has 
a pwdPolicySubentry=ads-pwdId=DVHead8300,ou=passwordPolicies,ads-
interceptorId=authenticationInterceptor,ou=interceptors,ads-
directoryServiceId=default,ou=config, it enforces the ads-
pwdId=DVHead8300 policy's ads-pwdInHistory setting even with the admin 
user.

My understanding is that since it's the admin user, it should not be 
enforcing any password policy rules.

Steps:
(1) Create a password policy where the ads-pwdInHistory is greater than 
0 so it enforces not reusing passwords.
(2) Create a uid and set it's pwdPolicySubentry to the above password 
policy.
(3) Create a connection and bind to it using the "uid=admin,ou=system" 
user, and then modify password for the above uid. You will get this 
error:
    error: invalid reuse of password present in password history




Reply via email to