Description of problem: After fixing bug 2077081, the LDAP password limit is now not 60, but 69 characters. There should be no limit. Version-Release number of selected component (if applicable): Sat 6.14 How reproducible: Deterministic Steps to Reproduce: Create users in Active Directory: qwerty (with 78 characters password), qwerty66 (with 66 characters password), qwerty69 (with 69 characters password). Attempt to use these users as the bind users for LDAP auth source. This is not about logging in as those users, rather as using those users to login to the AD itself to verify a user being logged in. 1) In WebUI: Administration -> Authentication Sources -> LDAP -> Create 2) On the first tab fill in the necessary data, select Active Directory as type (make sure you have the right cert for LDAPS, use update-ca-trust workflow) 3) On the second tab, use login <DOMAIN>\<user>, in my case: AD2019\qwerty and fill in the rest 4) On the third tab, I had to set login mapping from uid to cn 5) Submit => Failure, second tab's Password field marked red with text "is too long (maximum is 69 characters)". 6) Repeat 3,4,5 for users qwerty66 and qwerty69 => OK 7) Attempt to set 70-characters password => Failure as above 8) Finally, Submit with some account that works, I used qwerty69 9) Logout 10) Login using any <user>, I used qwerty66 => OK 11) In hammer: hammer auth-source ldap update --id <id> --account-password <password_of_qwerty_user> Could not update the Auth Source: Account password is too long (maximum is 69 characters) => OK Actual results: Password with length 70 or more can't be used for binding an LDAP user in auth source Expected results: Any password should be permitted