Description of problem: Currently, the Red Hat SSKG via the serverKeygenInputImpl and the pkcs12OutputImpl allow for any password to be used for the generated p12 files. Would like the ability to have a configurable option to force/enforce password complexity requirements for a user-provided password, or the ability to have a strong password generated and provided to the user upon submission to improve the security of the p12s with strong passwords. Version-Release number of selected component (if applicable): RHEL 8.x How reproducible: Very Steps to Reproduce: 1. Configure SSKG - https://access.redhat.com/documentation/en-us/red_hat_certificate_system/9/html/planning_installation_and_deployment_guide/configuration_for_server-side_keygen 2. Test with a password of 1234 Actual results: Allows pkcs12 to be created with weakened password Expected results: Desire a check for password comlpexity Additional info:
The bug is related to RHCS, thus product is set to Red Hat Certificate System
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (CA bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2025:3401