-
Bug
-
Resolution: Done
-
certsys-11.1
-
None
Description of problem:
Currently, the Red Hat SSKG via the serverKeygenInputImpl and the pkcs12OutputImpl allow for any password to be used for the generated p12 files. Would like the ability to have a configurable option to force/enforce password complexity requirements for a user-provided password, or the ability to have a strong password generated and provided to the user upon submission to improve the security of the p12s with strong passwords.
Version-Release number of selected component (if applicable):
RHEL 8.x
How reproducible:
Very
Steps to Reproduce:
1. Configure SSKG - https://access.redhat.com/documentation/en-us/red_hat_certificate_system/9/html/planning_installation_and_deployment_guide/configuration_for_server-side_keygen
2. Test with a password of 1234
Actual results:
Allows pkcs12 to be created with weakened password
Expected results:
Desire a check for password comlpexity
Additional info: