Bug 798359 - [RFE] IdM password policy should include checks for repeating characters
Summary: [RFE] IdM password policy should include checks for repeating characters
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: ipa
Version: 7.0
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Martin Kosek
QA Contact: IDM QE LIST
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-02-28 18:00 UTC by Rob Crittenden
Modified: 2016-02-19 11:51 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Enhancement
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-02-19 11:51:03 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Rob Crittenden 2012-02-28 18:00:22 UTC
This bug is created as a clone of upstream ticket:
https://fedorahosted.org/freeipa/ticket/2445

Policy should allow definition and enforcement of the following password policies:

* At most N consecutive occurrences of the same character.
* At most N consecutive increasing or decreasing alphanumeric characters

Comment 2 Martin Kosek 2016-02-19 11:51:03 UTC
Thank you taking your time and submitting this request for Red Hat Enterprise Linux. The request was cloned to the upstream tracker long time ago (see link to the upstream ticket above), but it was unfortunately not given a priority neither in the upstream project, nor in Red Hat Enterprise Linux.

Given that this request is not planned for a close release, it is highly unlikely it will be fixed in this major version of Red Hat Enterprise Linux. We are therefore closing the request as WONTFIX.

To request that Red Hat reconsiders the decision, please reopen the Bugzilla with the help of Red Hat Customer Service and provide additional business and/or technical details about it's importance to you. Please note that you can still track this request or even offer help in the referred upstream Trac ticket to expedite the solution.


Note You need to log in before you can comment on or make changes to this bug.