From 0cd83dc6657875c94be8cc5888c3e5f5b5c50fe2 Mon Sep 17 00:00:00 2001 From: Marisa Date: Fri, 17 Oct 2025 12:59:51 -0400 Subject: [PATCH] Update README.md --- README.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index ddad7e0..cd40680 100644 --- a/README.md +++ b/README.md @@ -700,7 +700,9 @@ These are the password policy options that the openLDAP ppolicy.so module accept `pwdInHistory` How many old passwords are stored. If a user attempts to set a password to one that is already in their historial, they will receive an error. The default is 0, the user can keep re-using the same password indefinitely.\ `pwdMinLength` Require all passwords to have a minimum length. The default is no minimum length requirement. This option to be ENFORCED, needs _pwdCheckQuality_ to be 1 or 2, even if pwdCheckQuality isn’t set, the length requirement will not be enforced.\ `pwdCheckQuality` This controls how the openLDAP server actually enforces password quality checks.\ - The default, which is 0, is to _not_ check the quality of the password. If it is set to 2, the server always _enforces_ the quality checks; if it is unable to check it due to password policies, the password failure will be logged and _rejected_. If it is set to 1, the server will _always_ accept a password, but it _will check it_ and be logged in the event it's unable to check it due to password policies. + The default, which is 0, is to _not_ check the quality of the password. \ + If it is set to 2, the server always _enforces_ the quality checks; if it is unable to check it due to password policies, the password failure will be logged and _rejected_. \ + If it is set to 1, the server will _always_ accept a password, but it _will check it_ and be logged in the event it's unable to check it due to password policies.\ ## _Show Organizational Units, users, and attributes_