Return-Path: Delivered-To: apmail-portals-jetspeed-dev-archive@www.apache.org Received: (qmail 8228 invoked from network); 26 Oct 2005 13:35:21 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 26 Oct 2005 13:35:21 -0000 Received: (qmail 66797 invoked by uid 500); 26 Oct 2005 13:35:18 -0000 Delivered-To: apmail-portals-jetspeed-dev-archive@portals.apache.org Received: (qmail 66768 invoked by uid 500); 26 Oct 2005 13:35:17 -0000 Mailing-List: contact jetspeed-dev-help@portals.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Jetspeed Developers List" Delivered-To: mailing list jetspeed-dev@portals.apache.org Received: (qmail 66757 invoked by uid 500); 26 Oct 2005 13:35:17 -0000 Delivered-To: apmail-jakarta-jetspeed-dev@jakarta.apache.org Received: (qmail 66754 invoked by uid 99); 26 Oct 2005 13:35:17 -0000 X-ASF-Spam-Status: No, hits=1.3 required=10.0 tests=SPF_FAIL X-Spam-Check-By: apache.org Received: from [192.87.106.226] (HELO ajax.apache.org) (192.87.106.226) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 26 Oct 2005 06:35:17 -0700 Received: from ajax.apache.org (ajax.apache.org [127.0.0.1]) by ajax.apache.org (Postfix) with ESMTP id 2ACD021F for ; Wed, 26 Oct 2005 15:34:56 +0200 (CEST) Message-ID: <410784848.1130333696173.JavaMail.jira@ajax.apache.org> Date: Wed, 26 Oct 2005 15:34:56 +0200 (CEST) From: "Ate Douma (JIRA)" To: jetspeed-dev@jakarta.apache.org Subject: [jira] Commented: (JS2-151) Security enhancements for password validation and enable/disable principals In-Reply-To: <141440296.1098222291880.JavaMail.apache@nagoya> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N [ http://issues.apache.org/jira/browse/JS2-151?page=comments#action_12355971 ] Ate Douma commented on JS2-151: ------------------------------- Task 9) will be implemented now with JS2-27, together with JS2-21 and thus will no longer depend on JS2-241. And because the other tasks are already done, I will close this issue. > Security enhancements for password validation and enable/disable principals > --------------------------------------------------------------------------- > > Key: JS2-151 > URL: http://issues.apache.org/jira/browse/JS2-151 > Project: Jetspeed 2 > Type: Improvement > Components: Security > Versions: 2.0-FINAL > Reporter: Ate Douma > Assignee: Ate Douma > Fix For: 2.0-FINAL > > As proposed on the list (see: http://nagoya.apache.org/eyebrowse/ReadMsg?listId=22&msgNo=18415 ) > several security enhancements will be implemented: > Allow: > 1) storing password encoded (initially using Base64) > 2) requiring a minimum length and a minimum number of numeric characters in a password > 3) keeping a history (queue) of previously used password and preventing a user to reuse one from this queue (with a configurale queue size) > 4) automatically expire password after a configurable time > 5) warning a user its password is going to be expired (with a configurable time before) > 6) locking a user out when the current password is expired > 7) forcing a user to change a password on first use > 8) disable a password after a certain number of failures to authenticate, reset check after success > 9) enable/disable principals: users,groups,roles (see also earlier and never implemented issue http://issues.apache.org/jira/browse/JS2-27 ) > This will be implemented using the the following enhancements: > - boolean enabled attribute for principals and credentials > false: principal/credential is *never* used in security checks, meaning: > - user cannot log in if its user principal is disabled > - user cannot log in if no credential is enabled > - disabled groups or roles will not be added to a subject > Usage for administrative purposes in *not* to be limited by this: > A administrator can still assign disabled groups/roles to a user/group/role or whatever. > They just won't have any effect *yet*. > - int authentication failures attribute on PasswordCredential (0 as default or for other type of credentials): > -1 means never tried yet (to indicate enforce change password on first use) > 0 means none or last time was successful > > 0 number of failures (to allow disable after configurable failures) > - boolean valid attribute on PasswordCredential (default = true, or only false if null/empty): > Allows for password sanity check before even trying to authenticate or set/change a password. > A specific PasswordCredential implementation (see next feature) then could check against above mentioned rules like minimum length, > number of numeric characters, a regular expression, etc. > - Define a PasswordCredentialComponent/Provider/Factory to allow specialized versions of PasswordCredential to be used > as describe above, instead of the current implementations which does hardcoded PasswordCredential instantiations. > - Date expiration date attribute on PasswordCredential indicating the lifespan of a password, > null in the default implementation indicating never > - boolean expired attribute indicating on PasswordCredential, default false: > true: non-valid PasswordCredential because a newer PasswordCredential is defined or the lifespan had ended. > - An enhanced CredentialHandler enforcing most of my above requirements, configurable through the jetspeed-spring.xml > with parameters like: password history size, password expiration time and max authentication failures. > - A new pipeline security value (in addition to the current one) which checks on a authenticated user (Subject) > - if a password change is required: force the user to a change password page/portlet > - if a password is about to be expired: inject some sort of warning message into the aggregated output > (I don't have clue yet how to do that, probably some kind of javascript message, maybe need an additional valve for that) > The above implementations will initially only be available as system wide features, not (yet?) per user, group or role. -- This message is automatically generated by JIRA. - If you think it was sent incorrectly contact one of the administrators: http://issues.apache.org/jira/secure/Administrators.jspa - For more information on JIRA, see: http://www.atlassian.com/software/jira --------------------------------------------------------------------- To unsubscribe, e-mail: jetspeed-dev-unsubscribe@portals.apache.org For additional commands, e-mail: jetspeed-dev-help@portals.apache.org