On 2022/09/21 15:31, Shawn McKinney wrote:


On Sep 20, 2022, at 3:25 PM, Emmanuel Lécharny <[email protected]> wrote:


After a first pass through the ApacheDS issues, and a removal of some of them 
(down to 379 from 410 issues), I'm going to work on the PasswordPolicy part of 
the server. On eof the reason is that 17 issues are related to this part, and 
also because there is some inconsistency in the way we deal with transaction 
when updating some entries, causing some JDBM breakage.

There is also a new version for the PasswordPolicy draft [1] and it would be 
useful to have our implementation folloiwng the few changes.

Here is how I'll process:
- First review the existing logic, wrt the RFC draft.
- Then probably create a dedicated interceptor, which will be set before the 
authentication interceptor: there is no technical or functionnal reason to mix 
those two interceptors AFAICT, that makes the code more complex to implement.

There are 3 areas where I think I will not follow the draft, at least in this 
version:
* The userPassword attribute is not considered as the only one that can contain 
some password. There is an attributeType that is defined which gives the list 
of attribute that may contain the password. I think a first step is to ignore 
that value. Once it works, going further should not really be such a pain...

Agreed, renaming pw attribute is limited, if not dubious value.

It's not a rename, it's defining the attribute which will contain the password. It can be whatever the user wants. But again, it's of little value.


* It's mentionned that some PasswordPolicies may be defined as subentries, and 
we may even define some administrativeRole to define the part of the DIT that 
is subject to this subentry. Again, a first implementation should focus on 
having the global PasswordPolicy working. Defining an AdminsitrativeRole induce 
some complexity that I'd rather move away atm.

Just a few words in favor of this. For example, min age.  When a user entry is 
created, they may need an admin reset.  If the min age is long duration the 
admin will be prevented.`

I'm nut sure I get what you mean... I don't see a valid reason to do an admin reset when a user is created. Admin will create the user, and we may have a request for the user to change its password, but it may be unrelated to what you wrote. What is the min age has to do with the fact we don't implement administrativeRoles ?

VCan you clarify?

Thanks !


Having said that, it’s still a bit of a corner case. I’m sure there are other 
reasons though.

Having said that, this work should progress at a comfortable pace, so I’m good 
with a phased approach.

* Last not least, and it relates to the first point, I will not handle the 
attributeType option used to defined with password attribute is impacted by a 
PasswordPolicy rule. For instance:

        pwdChangedTime;pwd-userPassword: 20000103121520Z

will not be taken into account now.

Feel free to comment !

I’m +1 on this work. My goal is to update fortress to follow, adding tests for 
verification.

Thanks

—
Shawn


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]


--
*Emmanuel Lécharny - CTO* 205 Promenade des Anglais – 06200 NICE
T. +33 (0)4 89 97 36 50
P. +33 (0)6 08 33 32 61
[email protected] https://www.busit.com/

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to