-
Notifications
You must be signed in to change notification settings - Fork 887
Insecure password blocking sign up flow is annoying #14984
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@ammario I'm working on this one currently. Based on your comments and what I checked in the code - I plan to :
We can add more rules if we want, but I feel like based on your description it will be enough. Also, do we want to use this opportunity to change it overall in our password flows , or just for this specific one ? |
If I understand it correctly you're removing all entropy checking? I think it's a nice feature on the frontend (when non-blocking) but don't feel strongly we should have it if inconvenient to implement.
An idea is keeping all validation in the backend and implementing a "check" endpoint to avoid issues of behavioral mismatch between FE and BE. The FE can send inputted passwords to the BE with a debounce before the user hits submit.
And, I do believe we should have a consistent UX and code-paths for every place we accept new passwords. |
Refers to #14984 Currently, password validation is done backend side and is not explicit enough so it can be painful to create first users. We'd like to make this validation easier - but also duplicate it frontend side to make it smoother. Flows involved : - First user set password - New user set password - Change password --------- Co-authored-by: BrunoQuaresma <bruno_nonato_quaresma@hotmail.com>
Refers to #14984 Currently, password validation is done backend side and is not explicit enough so it can be painful to create first users. We'd like to make this validation easier - but also duplicate it frontend side to make it smoother. Flows involved : - First user set password - New user set password - Change password --------- Co-authored-by: BrunoQuaresma <bruno_nonato_quaresma@hotmail.com>
@defelmnq Is there anything left here or can we resolve this issue now? |
All good now, resolved with the PR merged for a first iteration. |
So this is quite annoying:
Since this is a product directed towards a technical audience I would much prefer we make this entropy check a warning and not block sign up. Deployments with hefty security requirements should use SSO and not built in auth anyways.
The text was updated successfully, but these errors were encountered: