Bug 1044164 - Password administrators should be able to violate password policy
Summary: Password administrators should be able to violate password policy
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: 389-ds-base
Version: 7.0
Hardware: Unspecified
OS: Unspecified
high
unspecified
Target Milestone: rc
: ---
Assignee: Rich Megginson
QA Contact: Viktor Ashirov
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-12-17 21:36 UTC by Nathan Kinder
Modified: 2020-09-13 20:46 UTC (History)
4 users (show)

Fixed In Version: 389-ds-base-1.3.3.1-1.el7
Doc Type: Enhancement
Doc Text:
No need to doc. This is a defect in a new feature introduced to RHEL-7.1 (bz 1118007).
Clone Of:
Environment:
Last Closed: 2015-03-05 09:32:02 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github 389ds 389-ds-base issues 859 0 None None None 2020-09-13 20:46:20 UTC
Red Hat Product Errata RHSA-2015:0416 0 normal SHIPPED_LIVE Important: 389-ds-base security, bug fix, and enhancement update 2015-03-05 14:26:33 UTC

Description Nathan Kinder 2013-12-17 21:36:39 UTC
This bug is created as a clone of upstream ticket:
https://fedorahosted.org/389/ticket/47522

Password admins should be able to set passwords that are already in history or violate other password syntax.  AD allows these type of operations as well.

Comment 4 Amita Sharma 2014-11-18 07:09:38 UTC
Test Plan Created :: https://tcms.engineering.redhat.com/plan/15695/password-policy#testcases
Basic functional testing is done successfully.
Marking this bug as VERIFIED.

Comment 6 errata-xmlrpc 2015-03-05 09:32:02 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2015-0416.html


Note You need to log in before you can comment on or make changes to this bug.