-
Notifications
You must be signed in to change notification settings - Fork 44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Local accounts: check password quality #544
Comments
@giacomini what do you think can be the right requirement for the password? Do you agree with:
As a note about the haveibeenpwned service, I can report the follow.
I agree also this kind of check can be added. What do you think @giacomini ? |
@enricovianello about the minimum requirements, I think a mix of alpha, numeric and symbols with a min length of is a good starting point. In an ideal world, you would allow site to disabled each character group (with a variable in the instance config file) and define the minimum length (with a hardcoded min at 6 or 8?) but probably it is not so useful and you could wait that somebody comes with a real use case. |
Hi,
Currently, when defining the password for an IAM account, the only requirement is that the password is at least 6 characters. This looks very weak, considering that IAM is a central authentication service giving potentially access to a lot of resources. If it is not necessarily a problem when you disable/hide local account support, it is a major one if you enable IAM login through user/pwd.
An urgent first step would be to require at least 8 characters and to check for a mix of letters, characters and symbols. On the long term, the ability to define the criteria, at least the minimum length, would be good. And the ability to check the password with a service like https://haveibeenpwned.com would be great!
Cheers,
Michel
The text was updated successfully, but these errors were encountered: