Browse Source

increase max pw length policy limit

Jason Rivard 7 years ago
parent
commit
36a709dab4

+ 4 - 1
server/src/main/java/password/pwm/svc/event/SyslogAuditService.java

@@ -298,7 +298,10 @@ public class SyslogAuditService
     public void close( )
     {
         final SyslogIF syslogIF = syslogInstance;
-        syslogIF.shutdown();
+        if ( syslogIF != null )
+        {
+            syslogIF.shutdown();
+        }
         workQueueProcessor.close();
         syslogInstance = null;
     }

+ 4 - 0
server/src/main/resources/password/pwm/config/PwmSetting.xml

@@ -1049,6 +1049,10 @@
         </default>
     </setting>
     <setting hidden="false" key="password.policy.maximumLength" level="1" required="true">
+        <properties>
+            <property key="Minimum">0</property>
+            <property key="Maximum">10000</property>
+        </properties>
         <default>
             <value>64</value>
         </default>

+ 4 - 4
server/src/main/resources/password/pwm/i18n/PwmSetting.properties

@@ -512,15 +512,15 @@ Setting_Description_password.policy.allowNumeric=Enable this option to allow num
 Setting_Description_password.policy.allowSpecial=Enable this option to allow special (non alpha-numeric) characters in the password.
 Setting_Description_password.policy.caseSensitivity=Enable this option to control if the password is case sensitive.  In most cases, @PwmAppName@ can read this from the directory, but in some cases, the system cannot correctly read this value, so you can override it here.
 Setting_Description_password.policy.changeMessage=Specify a message @PwmAppName@ displays to the users during password changes.  Might include HTML markup.  You can override this setting by adding a change password message read as part of an LDAP password policy.
-Setting_Description_password.policy.charGroup.minimumMatch=Specify tthe number of regular expression matches defined in the setting <code>@PwmSettingReference\:password.policy.charGroup.regExValues@</code>.
+Setting_Description_password.policy.charGroup.minimumMatch=Specify the number of regular expression matches defined in the setting <code>@PwmSettingReference\:password.policy.charGroup.regExValues@</code>.
 Setting_Description_password.policy.charGroup.regExValues=Add an LDAP filter that contains a list of regular expression character matches.  Along with the setting <code>@PwmSettingReference\:password.policy.charGroup.minimumMatch@</code>, this setting allows creating a complex list of requirements that the user only needs to partially match.  For example, you can use this type of policy to replicate the Active Directory "3 out of 5" rules, but with more flexibility and customization.
 Setting_Description_password.policy.checkWordlist=Enable this option to check the password against the configured Word List.
 Setting_Description_password.policy.disallowCurrent=Enable this option to prohibit the current password from being used as a new password.  Note: @PwmAppName@ can only enforce this if the login method permits the user's password to be known.
 Setting_Description_password.policy.disallowedAttributes=Specify a list of attributes not allowed to be used as passwords.  For a given user, @PwmAppName@ reads the values and does not permit the users to use it as part of the password value.  This check is case-insensitive.  Note: Specifying a number after the attribute name restricts how many consecutive characters @PwmAppName@ disallows in the value (For example: "Language:4" means the password cannot contain: "Engl", "ngli", "glis", or "lish", for English speaking users).
-Setting_Description_password.policy.disallowedValues=Speciy a case insensitive list of values @PwmAppName@ does not allow the users to use as passwords.
+Setting_Description_password.policy.disallowedValues=Specify a case insensitive list of values @PwmAppName@ does not allow the users to use as passwords.
 Setting_Description_password.policy.maximumAlpha=Specify the maximum amount of alphabetic characters required.  A value of zero disables this check.
-Setting_Description_password.policy.maximumConsecutive=Speicfy the maximum amount of characters in a sequence such as <b>0123456789</b> or <b>abcdefghijk</b>.  @PwmAppName@ defines a more specific character sequence by the unicode character order of each character after it converts the entire value to lowercase.   A value of 0 disables this check.
-Setting_Description_password.policy.maximumLength=Specify the maximum length of the password.  A value of zero disables this check.
+Setting_Description_password.policy.maximumConsecutive=Specify the maximum amount of characters in a sequence such as <b>0123456789</b> or <b>abcdefghijk</b>.  @PwmAppName@ defines a more specific character sequence by the unicode character order of each character after it converts the entire value to lowercase.   A value of 0 disables this check.
+Setting_Description_password.policy.maximumLength=Specify the maximum length of the password.  A value of zero disables this check.  Although you can set this limit to large values, the LDAP directory being used may have fixed limitations on the supported password length.
 Setting_Description_password.policy.maximumLowerCase=Specify the maximum amount of lowercase characters required.  A value of zero disables this check.
 Setting_Description_password.policy.maximumNonAlpha=Specify the maximum amount of non-alphabetic characters required.  A value of zero disables this check.
 Setting_Description_password.policy.maximumNumeric=Specify the maximum amount of numeric characters required (if the password policy allows numeric).  A value of zero disables this check.