Bug 2049640 - sssd does not convey LDAP password policy state to end users
Summary: sssd does not convey LDAP password policy state to end users
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: sssd
Version: 8.3
Hardware: x86_64
OS: Linux
low
low
Target Milestone: rc
: ---
Assignee: sssd-maint
QA Contact: sssd-qe
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-02-02 13:50 UTC by Anton Bobrov
Modified: 2023-05-31 17:13 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-05-31 17:12:59 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-110736 0 None None None 2022-02-02 13:55:58 UTC
Red Hat Issue Tracker SSSD-4332 0 None Waiting on Red Hat [RFE][cephmetrics] Add replication metrics/status in ceph dashboard for multi-site environments 2022-05-12 22:51:04 UTC

Description Anton Bobrov 2022-02-02 13:50:10 UTC
Description of problem:

When sssd is configured with LDAP access provider and the LDAP server has password policies in place which put constraints on certain operations eg password quality checks sssd does not propagate related LDAP password policy errors (constraints violations) to end user tools such as 'passwd'. sssd error logs show actual password policy constraints as responses from LDAP backend eg

(2022-01-21 16:19:43): [be[example.com]] [sdap_exop_modify_passwd_done] (0x1000): [RID#369] Password Policy Response: expire [-1] grace [-1] error [Password fails quality checks].
(2022-01-21 16:19:43): [be[example.com]] [sdap_exop_modify_passwd_done] (0x0080): [RID#369] ldap_extended_operation result: Constraint violation(19), Failed to update password

but they are not propagated.

Actual results:

Password change failed. Server message: Failed to update password

Expected results:

Password change failed. Server message: Password fails quality checks

Comment 1 Andre Boscatto 2023-05-31 17:12:59 UTC
Please know that we carefully considered and evaluated your request and its potential impact on our product roadmap, market demand, and overall strategy.

While we understand that addressing enhancements, bugs, and issues is critical for ensuring the quality and reliability of our product, we need to balance these priorities with our long-term goals and resource constraints. Unfortunately, we cannot address this request at this time as it does not align with our product vision and strategy, and keeping it in the backlog would be misleading and give the false impression that we will address it in the future, thus we are closing it.

Although we cannot address this specific request, we encourage anyone to collaborate and contribute to the upstream communities, as this approach enhances the flexibility, scalability, and customization of our solution while maintaining its security and stability.

We apologize for any inconvenience this may cause, and we understand that it can be frustrating when requests/expectations are not met. However, we hope that you can appreciate that we must balance our priorities with our long-term goals and resource constraints.

Please be aware that while you are welcome to open a new support case or reopen this request, we cannot guarantee that it will be addressed due to resource constraints and the prioritization of other requests.

Once again, thank you for taking the time to share feedback with us, and we look forward to continuing to work together to deliver the best possible solution, supporting in any way we can.

Thank you for understanding,

André Boscatto
Product Owner - Identity and Access Management Department


Note You need to log in before you can comment on or make changes to this bug.