Skip to content

Manual password reset process does not enforce password complexity requirements #5787

@mayzhang2000

Description

@mayzhang2000

Summary

Argo CD requires username/password authentication, such as that for the default administrator account, be set via kubectl. This account can then be logged into later with the CLI or Web UI. However, due to password reset conventions, there are no password complexity requirements.
In the event a user selects a password which is considered inefficient by today’s standards, an attacker may be able to gain access to their account. This is a scenario which would be otherwise easily preventable if password setting/resetting methodology was implemented first-party.

Motivation

Please give examples of your use case, e.g. when would you use this.

Proposal

Implement first-party password setting functionality that enforces reasonable password complexity requirements.

How do you think this should be implemented?

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or requestsecuritySecurity related issues

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions