ipaserver.plugins.pwpolicy.pwpolicy

class ipaserver.plugins.pwpolicy.pwpolicy(api)[source]

Bases: ipaserver.plugins.baseldap.LDAPObject

Password Policy object

Public Methods:

get_dn(*keys, **options)

Construct an LDAP DN.

convert_time_for_output(entry_attrs, **options)

convert_time_on_input(entry_attrs)

validate_minlength(ldap, entry_attrs[, add])

If any of the libpwquality options are used then the minimum length must be >= 6 which is the built-in default of libpwquality.

validate_lifetime(entry_attrs[, add])

Ensure that the maximum lifetime is greater than the minimum.

add_cospriority(entry, pwpolicy_name[, rights])

Inherited from LDAPObject

get_dn(*keys, **options)

Construct an LDAP DN.

get_dn_if_exists(*keys, **kwargs)

get_primary_key_from_dn(dn)

get_ancestor_primary_keys()

has_objectclass(classes, objectclass)

convert_attribute_members(entry_attrs, ...)

get_indirect_members(entry_attrs, attrs_list)

get_memberindirect(group_entry)

Get indirect members

get_memberofindirect(entry)

get_password_attributes(ldap, dn, entry_attrs)

Search on the entry to determine if it has a password or keytab set.

handle_not_found(*keys)

Handle NotFound exception

handle_duplicate_entry(*keys)

__json__()

Inherited from Object

backend

methods

params

primary_key

params_minus_pk

params_minus(*names)

Yield all Param whose name is not in names.

get_dn(*keys, **options)

Construct an LDAP DN.

get_params()

This method gets called by HasParam._create_param_namespace().

__json__()

Inherited from Plugin

__init__(api)

finalize()

Finalize plugin initialization.

ensure_finalized()

Finalize plugin initialization if it has not yet been finalized.

__repr__()

Return 'module_name.class_name()' representation.

Inherited from ReadOnly

__lock__()

Put this instance into a read-only state.

__islocked__()

Return True if instance is locked, otherwise False.

__setattr__(name, value)

If unlocked, set attribute named name to value.

__delattr__(name)

If unlocked, delete attribute named name.

Private Data Attributes:

Inherited from ReadOnly

_ReadOnly__locked

Private Methods:

Inherited from Object

_on_finalize()

Do custom finalization.

_Object__get_attrs(name)

Inherited from HasParam

_get_param_iterable(name[, verb])

Return an iterable of params defined by the attribute named name.

_filter_param_by_context(name[, env])

Filter params on attribute named name by environment env.

_create_param_namespace(name[, env])

Inherited from Plugin

_Plugin__name_getter()

_Plugin__full_name_getter()

_Plugin__bases_getter()

_Plugin__doc_getter()

_Plugin__summary_getter()

_on_finalize()

Do custom finalization.


property Backend
property Command
NO_CLI = False
__annotations__ = {}
__delattr__(name)

If unlocked, delete attribute named name.

If this instance is locked, an AttributeError will be raised.

Parameters

name – Name of attribute to delete.

__dict__ = mappingproxy({'__module__': 'ipaserver.plugins.pwpolicy', '__doc__': '\n    Password Policy object\n    ', 'container_dn': ipapython.dn.DN('cn=IPA.EXAMPLE,cn=kerberos'), 'object_name': Gettext('password policy', domain='ipa', localedir=None), 'object_name_plural': Gettext('password policies', domain='ipa', localedir=None), 'object_class': ['top', 'nscontainer', 'krbpwdpolicy', 'ipapwdpolicy'], 'permission_filter_objectclasses': ['krbpwdpolicy', 'ipapwdpolicy'], 'default_attributes': ['cn', 'cospriority', 'krbmaxpwdlife', 'krbminpwdlife', 'krbpwdhistorylength', 'krbpwdmindiffchars', 'krbpwdminlength', 'krbpwdmaxfailure', 'krbpwdfailurecountinterval', 'krbpwdlockoutduration', 'ipapwdmaxrepeat', 'ipapwdmaxsequence', 'ipapwddictcheck', 'ipapwdusercheck', 'passwordgracelimit'], 'managed_permissions': {'System: Read Group Password Policy': {'replaces_global_anonymous_aci': True, 'ipapermbindruletype': 'permission', 'ipapermright': {'read', 'search', 'compare'}, 'ipapermdefaultattr': {'krbpwdminlength', 'objectclass', 'krbpwdmindiffchars', 'ipapwdmaxrepeat', 'passwordgracelimit', 'ipapwdmaxsequence', 'krbpwdfailurecountinterval', 'krbpwdhistorylength', 'krbmaxpwdlife', 'krbminpwdlife', 'ipapwddictcheck', 'krbpwdmaxfailure', 'ipapwdusercheck', 'cospriority', 'cn', 'krbpwdlockoutduration'}, 'default_privileges': {'Password Policy Administrator', 'Password Policy Readers'}}, 'System: Add Group Password Policy': {'ipapermright': {'add'}, 'replaces': ['(target = "ldap:///cn=*,cn=$REALM,cn=kerberos,$SUFFIX")(version 3.0;acl "permission:Add Group Password Policy";allow (add) groupdn = "ldap:///cn=Add Group Password Policy,cn=permissions,cn=pbac,$SUFFIX";)'], 'default_privileges': {'Password Policy Administrator'}}, 'System: Delete Group Password Policy': {'ipapermright': {'delete'}, 'replaces': ['(target = "ldap:///cn=*,cn=$REALM,cn=kerberos,$SUFFIX")(version 3.0;acl "permission:Delete Group Password Policy";allow (delete) groupdn = "ldap:///cn=Delete Group Password Policy,cn=permissions,cn=pbac,$SUFFIX";)'], 'default_privileges': {'Password Policy Administrator'}}, 'System: Modify Group Password Policy': {'ipapermright': {'write'}, 'ipapermdefaultattr': {'krbpwdminlength', 'krbpwdmindiffchars', 'krbpwdmaxfailure', 'ipapwdusercheck', 'ipapwdmaxrepeat', 'passwordgracelimit', 'ipapwdmaxsequence', 'krbpwdfailurecountinterval', 'krbpwdhistorylength', 'krbmaxpwdlife', 'krbminpwdlife', 'ipapwddictcheck', 'krbpwdlockoutduration'}, 'replaces': ['(targetattr = "krbmaxpwdlife || krbminpwdlife || krbpwdhistorylength || krbpwdmindiffchars || krbpwdminlength || krbpwdmaxfailure || krbpwdfailurecountinterval || krbpwdlockoutduration")(target = "ldap:///cn=*,cn=$REALM,cn=kerberos,$SUFFIX")(version 3.0;acl "permission:Modify Group Password Policy";allow (write) groupdn = "ldap:///cn=Modify Group Password Policy,cn=permissions,cn=pbac,$SUFFIX";)'], 'default_privileges': {'Password Policy Administrator'}}}, 'label': Gettext('Password Policies', domain='ipa', localedir=None), 'label_singular': Gettext('Password Policy', domain='ipa', localedir=None), 'takes_params': (Str('cn?', cli_name='group', doc=Gettext('Manage password policy for specific group', domain='ipa', localedir=None), label=Gettext('Group', domain='ipa', localedir=None), primary_key=True), Int('krbmaxpwdlife?', cli_name='maxlife', doc=Gettext('Maximum password lifetime (in days)', domain='ipa', localedir=None), label=Gettext('Max lifetime (days)', domain='ipa', localedir=None), maxvalue=20000, minvalue=0), Int('krbminpwdlife?', cli_name='minlife', doc=Gettext('Minimum password lifetime (in hours)', domain='ipa', localedir=None), label=Gettext('Min lifetime (hours)', domain='ipa', localedir=None), minvalue=0), Int('krbpwdhistorylength?', cli_name='history', doc=Gettext('Password history size', domain='ipa', localedir=None), label=Gettext('History size', domain='ipa', localedir=None), minvalue=0), Int('krbpwdmindiffchars?', cli_name='minclasses', doc=Gettext('Minimum number of character classes', domain='ipa', localedir=None), label=Gettext('Character classes', domain='ipa', localedir=None), maxvalue=5, minvalue=0), Int('krbpwdminlength?', cli_name='minlength', doc=Gettext('Minimum length of password', domain='ipa', localedir=None), label=Gettext('Min length', domain='ipa', localedir=None), minvalue=0), Int('cospriority', cli_name='priority', doc=Gettext('Priority of the policy (higher number means lower priority', domain='ipa', localedir=None), flags=[u'virtual_attribute'], label=Gettext('Priority', domain='ipa', localedir=None), minvalue=0), Int('krbpwdmaxfailure?', cli_name='maxfail', doc=Gettext('Consecutive failures before lockout', domain='ipa', localedir=None), label=Gettext('Max failures', domain='ipa', localedir=None), minvalue=0), Int('krbpwdfailurecountinterval?', cli_name='failinterval', doc=Gettext('Period after which failure count will be reset (seconds)', domain='ipa', localedir=None), label=Gettext('Failure reset interval', domain='ipa', localedir=None), minvalue=0), Int('krbpwdlockoutduration?', cli_name='lockouttime', doc=Gettext('Period for which lockout is enforced (seconds)', domain='ipa', localedir=None), label=Gettext('Lockout duration', domain='ipa', localedir=None), minvalue=0), Int('ipapwdmaxrepeat?', cli_name='maxrepeat', default=0, doc=Gettext('Maximum number of same consecutive characters', domain='ipa', localedir=None), label=Gettext('Max repeat', domain='ipa', localedir=None), maxvalue=256, minvalue=0), Int('ipapwdmaxsequence?', cli_name='maxsequence', default=0, doc=Gettext('The max. length of monotonic character sequences (abcd)', domain='ipa', localedir=None), label=Gettext('Max sequence', domain='ipa', localedir=None), maxvalue=256, minvalue=0), Bool('ipapwddictcheck?', cli_name='dictcheck', default=False, doc=Gettext('Check if the password is a dictionary word', domain='ipa', localedir=None), label=Gettext('Dictionary check', domain='ipa', localedir=None)), Bool('ipapwdusercheck?', cli_name='usercheck', default=False, doc=Gettext('Check if the password contains the username', domain='ipa', localedir=None), label=Gettext('User check', domain='ipa', localedir=None)), Int('passwordgracelimit?', cli_name='gracelimit', default=-1, doc=Gettext('Number of LDAP authentications allowed after expiration', domain='ipa', localedir=None), label=Gettext('Grace login limit', domain='ipa', localedir=None), maxvalue=4294967295, minvalue=-1)), 'get_dn': <function pwpolicy.get_dn>, 'convert_time_for_output': <function pwpolicy.convert_time_for_output>, 'convert_time_on_input': <function pwpolicy.convert_time_on_input>, 'validate_minlength': <function pwpolicy.validate_minlength>, 'validate_lifetime': <function pwpolicy.validate_lifetime>, 'add_cospriority': <function pwpolicy.add_cospriority>, '__annotations__': {}})
__init__(api)
__islocked__()

Return True if instance is locked, otherwise False.

__json__()
__lock__()

Put this instance into a read-only state.

After the instance has been locked, attempting to set or delete an attribute will raise an AttributeError.

__module__ = 'ipaserver.plugins.pwpolicy'
__repr__()

Return ‘module_name.class_name()’ representation.

This representation could be used to instantiate this Plugin instance given the appropriate environment.

__setattr__(name, value)

If unlocked, set attribute named name to value.

If this instance is locked, an AttributeError will be raised.

Parameters
  • name – Name of attribute to set.

  • value – Value to assign to attribute.

__weakref__

list of weak references to the object (if defined)

_create_param_namespace(name, env=None)
_filter_param_by_context(name, env=None)

Filter params on attribute named name by environment env.

For example:

>>> from ipalib.config import Env
>>> class Example(HasParam):
...
...     takes_args = (
...         Str('foo_only', include=['foo']),
...         Str('not_bar', exclude=['bar']),
...         'both',
...     )
...
...     def get_args(self):
...         return self._get_param_iterable('args')
...
...
>>> eg = Example()
>>> foo = Env(context='foo')
>>> bar = Env(context='bar')
>>> another = Env(context='another')
>>> (foo.context, bar.context, another.context)
(u'foo', u'bar', u'another')
>>> list(eg._filter_param_by_context('args', foo))
[Str('foo_only', include=['foo']), Str('not_bar', exclude=['bar']), Str('both')]
>>> list(eg._filter_param_by_context('args', bar))
[Str('both')]
>>> list(eg._filter_param_by_context('args', another))
[Str('not_bar', exclude=['bar']), Str('both')]
_get_param_iterable(name, verb='takes')

Return an iterable of params defined by the attribute named name.

A sequence of params can be defined one of three ways: as a tuple; as a callable that returns an iterable; or as a param spec (a Param or str instance). This method returns a uniform iterable regardless of how the param sequence was defined.

For example, when defined with a tuple:

>>> class ByTuple(HasParam):
...     takes_args = (Param('foo'), Param('bar'))
...
>>> by_tuple = ByTuple()
>>> list(by_tuple._get_param_iterable('args'))
[Param('foo'), Param('bar')]

Or you can define your param sequence with a callable when you need to reference attributes on your plugin instance (for validation rules, etc.). For example:

>>> class ByCallable(HasParam):
...     def takes_args(self):
...         yield Param('foo', self.validate_foo)
...         yield Param('bar', self.validate_bar)
...
...     def validate_foo(self, _, value, **kw):
...         if value != 'Foo':
...             return _("must be 'Foo'")
...
...     def validate_bar(self, _, value, **kw):
...         if value != 'Bar':
...             return _("must be 'Bar'")
...
>>> by_callable = ByCallable()
>>> list(by_callable._get_param_iterable('args'))
[Param('foo', validate_foo), Param('bar', validate_bar)]

Lastly, as a convenience for when a param sequence contains a single param, your defining attribute may a param spec (either a Param or an str instance). For example:

>>> class BySpec(HasParam):
...     takes_args = Param('foo')
...     takes_options = 'bar?'
...
>>> by_spec = BySpec()
>>> list(by_spec._get_param_iterable('args'))
[Param('foo')]
>>> list(by_spec._get_param_iterable('options'))
['bar?']

For information on how an str param spec is interpreted, see the create_param() and parse_param_spec() functions in the ipalib.parameters module.

Also see HasParam._filter_param_by_context().

_on_finalize()

Do custom finalization.

This method is called from finalize(). Subclasses can override this method in order to add custom finalization.

add_cospriority(entry, pwpolicy_name, rights=True)[source]
allow_rename = False
already_exists_msg = Gettext('%(oname)s with name "%(pkey)s" already exists', domain='ipa', localedir=None)
property api

Return API instance passed to __init__().

attribute_members = {}
backend = None
backend_name = 'ldap2'
bases = (<class 'ipaserver.plugins.baseldap.LDAPObject'>,)
bindable = False
container_dn = ipapython.dn.DN('cn=IPA.EXAMPLE,cn=kerberos')
container_not_found_msg = Gettext('container entry (%(container)s) not found', domain='ipa', localedir=None)
property context
convert_attribute_members(entry_attrs, *keys, **options)
convert_time_for_output(entry_attrs, **options)[source]
convert_time_on_input(entry_attrs)[source]
default_attributes = ['cn', 'cospriority', 'krbmaxpwdlife', 'krbminpwdlife', 'krbpwdhistorylength', 'krbpwdmindiffchars', 'krbpwdminlength', 'krbpwdmaxfailure', 'krbpwdfailurecountinterval', 'krbpwdlockoutduration', 'ipapwdmaxrepeat', 'ipapwdmaxsequence', 'ipapwddictcheck', 'ipapwdusercheck', 'passwordgracelimit']
disallow_object_classes = []
doc = '\n    Password Policy object\n    '
ensure_finalized()

Finalize plugin initialization if it has not yet been finalized.

property env
finalize()

Finalize plugin initialization.

This method calls _on_finalize() and locks the plugin object.

Subclasses should not override this method. Custom finalization is done in _on_finalize().

class finalize_attr(name, value=None)

Bases: object

Create a stub object for plugin attribute that isn’t set until the finalization of the plugin initialization.

When the stub object is accessed, it calls ensure_finalized() to make sure the plugin initialization is finalized. The stub object is expected to be replaced with the actual attribute value during the finalization (preferably in _on_finalize()), otherwise an AttributeError is raised.

This is used to implement on-demand finalization of plugin initialization.

__annotations__ = {}
__get__(obj, cls)
__init__(name, value=None)
__module__ = 'ipalib.plugable'
__slots__ = ('name', 'value')
name
value
full_name = 'pwpolicy/1'
get_ancestor_primary_keys()
get_dn(*keys, **options)[source]

Construct an LDAP DN.

get_dn_if_exists(*keys, **kwargs)
get_indirect_members(entry_attrs, attrs_list)
get_memberindirect(group_entry)

Get indirect members

get_memberofindirect(entry)
get_params()

This method gets called by HasParam._create_param_namespace().

get_password_attributes(ldap, dn, entry_attrs)

Search on the entry to determine if it has a password or keytab set.

A tuple is used to determine which attribute is set in entry_attrs. The value is set to True/False whether a given password type is set.

get_primary_key_from_dn(dn)
handle_duplicate_entry(*keys)
handle_not_found(*keys)

Handle NotFound exception

Must raise errors.NotFound again.

has_objectclass(classes, objectclass)
hidden_attributes = ['objectclass', 'aci']
json_friendly_attributes = ('parent_object', 'container_dn', 'object_name', 'object_name_plural', 'object_class', 'object_class_config', 'default_attributes', 'label', 'label_singular', 'hidden_attributes', 'uuid_attribute', 'attribute_members', 'name', 'takes_params', 'rdn_attribute', 'bindable', 'relationships')
label = Gettext('Password Policies', domain='ipa', localedir=None)
label_singular = Gettext('Password Policy', domain='ipa', localedir=None)
limit_object_classes = []
managed_permissions = {'System: Add Group Password Policy': {'default_privileges': {'Password Policy Administrator'}, 'ipapermright': {'add'}, 'replaces': ['(target = "ldap:///cn=*,cn=$REALM,cn=kerberos,$SUFFIX")(version 3.0;acl "permission:Add Group Password Policy";allow (add) groupdn = "ldap:///cn=Add Group Password Policy,cn=permissions,cn=pbac,$SUFFIX";)']}, 'System: Delete Group Password Policy': {'default_privileges': {'Password Policy Administrator'}, 'ipapermright': {'delete'}, 'replaces': ['(target = "ldap:///cn=*,cn=$REALM,cn=kerberos,$SUFFIX")(version 3.0;acl "permission:Delete Group Password Policy";allow (delete) groupdn = "ldap:///cn=Delete Group Password Policy,cn=permissions,cn=pbac,$SUFFIX";)']}, 'System: Modify Group Password Policy': {'default_privileges': {'Password Policy Administrator'}, 'ipapermdefaultattr': {'ipapwddictcheck', 'ipapwdmaxrepeat', 'ipapwdmaxsequence', 'ipapwdusercheck', 'krbmaxpwdlife', 'krbminpwdlife', 'krbpwdfailurecountinterval', 'krbpwdhistorylength', 'krbpwdlockoutduration', 'krbpwdmaxfailure', 'krbpwdmindiffchars', 'krbpwdminlength', 'passwordgracelimit'}, 'ipapermright': {'write'}, 'replaces': ['(targetattr = "krbmaxpwdlife || krbminpwdlife || krbpwdhistorylength || krbpwdmindiffchars || krbpwdminlength || krbpwdmaxfailure || krbpwdfailurecountinterval || krbpwdlockoutduration")(target = "ldap:///cn=*,cn=$REALM,cn=kerberos,$SUFFIX")(version 3.0;acl "permission:Modify Group Password Policy";allow (write) groupdn = "ldap:///cn=Modify Group Password Policy,cn=permissions,cn=pbac,$SUFFIX";)']}, 'System: Read Group Password Policy': {'default_privileges': {'Password Policy Administrator', 'Password Policy Readers'}, 'ipapermbindruletype': 'permission', 'ipapermdefaultattr': {'cn', 'cospriority', 'ipapwddictcheck', 'ipapwdmaxrepeat', 'ipapwdmaxsequence', 'ipapwdusercheck', 'krbmaxpwdlife', 'krbminpwdlife', 'krbpwdfailurecountinterval', 'krbpwdhistorylength', 'krbpwdlockoutduration', 'krbpwdmaxfailure', 'krbpwdmindiffchars', 'krbpwdminlength', 'objectclass', 'passwordgracelimit'}, 'ipapermright': {'compare', 'read', 'search'}, 'replaces_global_anonymous_aci': True}}
methods = None
name = 'pwpolicy'
object_class = ['top', 'nscontainer', 'krbpwdpolicy', 'ipapwdpolicy']
object_class_config = None
object_name = Gettext('password policy', domain='ipa', localedir=None)
object_name_plural = Gettext('password policies', domain='ipa', localedir=None)
object_not_found_msg = Gettext('%(pkey)s: %(oname)s not found', domain='ipa', localedir=None)
params = None
params_minus(*names)

Yield all Param whose name is not in names.

params_minus_pk = None
parent_not_found_msg = Gettext('%(parent)s: %(oname)s not found', domain='ipa', localedir=None)
parent_object = ''
password_attributes = []
permission_filter_objectclasses = ['krbpwdpolicy', 'ipapwdpolicy']
possible_objectclasses = []
primary_key = None
rdn_attribute = ''
relationships = {'member': ('Member', '', 'no_'), 'memberindirect': ('Indirect Member', None, 'no_indirect_'), 'membermanager': ('Group membership managed by', 'membermanager_', 'not_membermanager_'), 'memberof': ('Member Of', 'in_', 'not_in_'), 'memberofindirect': ('Indirect Member Of', None, 'not_in_indirect_')}
search_attributes = []
search_attributes_config = None
search_display_attributes = []
summary = 'Password Policy object'
takes_params = (Str('cn?', cli_name='group', doc=Gettext('Manage password policy for specific group', domain='ipa', localedir=None), label=Gettext('Group', domain='ipa', localedir=None), primary_key=True), Int('krbmaxpwdlife?', cli_name='maxlife', doc=Gettext('Maximum password lifetime (in days)', domain='ipa', localedir=None), label=Gettext('Max lifetime (days)', domain='ipa', localedir=None), maxvalue=20000, minvalue=0), Int('krbminpwdlife?', cli_name='minlife', doc=Gettext('Minimum password lifetime (in hours)', domain='ipa', localedir=None), label=Gettext('Min lifetime (hours)', domain='ipa', localedir=None), minvalue=0), Int('krbpwdhistorylength?', cli_name='history', doc=Gettext('Password history size', domain='ipa', localedir=None), label=Gettext('History size', domain='ipa', localedir=None), minvalue=0), Int('krbpwdmindiffchars?', cli_name='minclasses', doc=Gettext('Minimum number of character classes', domain='ipa', localedir=None), label=Gettext('Character classes', domain='ipa', localedir=None), maxvalue=5, minvalue=0), Int('krbpwdminlength?', cli_name='minlength', doc=Gettext('Minimum length of password', domain='ipa', localedir=None), label=Gettext('Min length', domain='ipa', localedir=None), minvalue=0), Int('cospriority', cli_name='priority', doc=Gettext('Priority of the policy (higher number means lower priority', domain='ipa', localedir=None), flags=[u'virtual_attribute'], label=Gettext('Priority', domain='ipa', localedir=None), minvalue=0), Int('krbpwdmaxfailure?', cli_name='maxfail', doc=Gettext('Consecutive failures before lockout', domain='ipa', localedir=None), label=Gettext('Max failures', domain='ipa', localedir=None), minvalue=0), Int('krbpwdfailurecountinterval?', cli_name='failinterval', doc=Gettext('Period after which failure count will be reset (seconds)', domain='ipa', localedir=None), label=Gettext('Failure reset interval', domain='ipa', localedir=None), minvalue=0), Int('krbpwdlockoutduration?', cli_name='lockouttime', doc=Gettext('Period for which lockout is enforced (seconds)', domain='ipa', localedir=None), label=Gettext('Lockout duration', domain='ipa', localedir=None), minvalue=0), Int('ipapwdmaxrepeat?', cli_name='maxrepeat', default=0, doc=Gettext('Maximum number of same consecutive characters', domain='ipa', localedir=None), label=Gettext('Max repeat', domain='ipa', localedir=None), maxvalue=256, minvalue=0), Int('ipapwdmaxsequence?', cli_name='maxsequence', default=0, doc=Gettext('The max. length of monotonic character sequences (abcd)', domain='ipa', localedir=None), label=Gettext('Max sequence', domain='ipa', localedir=None), maxvalue=256, minvalue=0), Bool('ipapwddictcheck?', cli_name='dictcheck', default=False, doc=Gettext('Check if the password is a dictionary word', domain='ipa', localedir=None), label=Gettext('Dictionary check', domain='ipa', localedir=None)), Bool('ipapwdusercheck?', cli_name='usercheck', default=False, doc=Gettext('Check if the password contains the username', domain='ipa', localedir=None), label=Gettext('User check', domain='ipa', localedir=None)), Int('passwordgracelimit?', cli_name='gracelimit', default=-1, doc=Gettext('Number of LDAP authentications allowed after expiration', domain='ipa', localedir=None), label=Gettext('Grace login limit', domain='ipa', localedir=None), maxvalue=4294967295, minvalue=-1))
uuid_attribute = ''
validate_lifetime(entry_attrs, add=False, *keys)[source]

Ensure that the maximum lifetime is greater than the minimum. If there is no minimum lifetime set then don’t return an error.

validate_minlength(ldap, entry_attrs, add=False, *keys)[source]

If any of the libpwquality options are used then the minimum length must be >= 6 which is the built-in default of libpwquality. Allowing a lower value to be set will result in a failed policy check and a generic error message.

version = '1'