Bug 1784655

Summary: Max Password Lifetime in KDC policy is not being enforced
Product: Red Hat Enterprise Linux 8 Reporter: Robbie Harwood <rharwood>
Component: krb5Assignee: Robbie Harwood <rharwood>
Status: CLOSED ERRATA QA Contact: Filip Dvorak <fdvorak>
Severity: medium Docs Contact: Josip Vilicic <jvilicic>
Priority: unspecified    
Version: 8.3CC: dpal, fdvorak, fhanzelk, jvilicic, pasik, xzhou
Target Milestone: rcKeywords: TestCaseProvided
Target Release: 8.0   
Hardware: x86_64   
OS: Linux   
URL: https://github.com/krb5/krb5/pull/1016
Whiteboard:
Fixed In Version: krb5-1.18.2-2.el8 Doc Type: Bug Fix
Doc Text:
.KDCs now correctly enforce password lifetime policy from LDAP backends Previously, non-IPA Kerberos Distribution Centers (KDCs) did not ensure maximum password lifetimes because the Kerberos LDAP backend incorrectly enforced password policies. With this update, the Kerberos LDAP backend has been fixed, and password lifetimes behave as expected.
Story Points: ---
Clone Of: 1782492 Environment:
Last Closed: 2020-11-04 01:59:24 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1782492, 1825061    

Comment 13 errata-xmlrpc 2020-11-04 01:59:24 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (krb5 bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:4541