pam_policy: Default settings : disabled
All checks were successful
Ansible Lint |Total|New|Outstanding|Fixed|Trend |:-:|:-:|:-:|:-:|:-: |2790|7|2783|8|:+1: Reference build: <a href="https://jenkins.evolix.org/job/gitea/job/ansible-roles/job/unstable/267//ansiblelint">Evolix » ansible-roles » unstable #267</a>
gitea/ansible-roles/pipeline/head This commit looks good

This commit is contained in:
Ludovic Poujol 2023-06-05 11:33:08 +02:00
parent b234fdaea9
commit 24d7fe5def

View file

@ -2,31 +2,31 @@
# PAM -- pam_pwquality
# Ensure password meet a given quality/complexity requirement
policy_pam_pwquality: true
policy_pam_pwquality: false
# Configuration settings for pam_pwquality
# For more in depth info, see man pam_pwquality(8)
# Minimum password lengh/credit
policy_pam_pwquality_minlen: 4
policy_pam_pwquality_minlen: 16
# Credits values for char types
# Value : Interger N with :
# N >= 0 - Maximum credit given for each char type in the password
# N < 0 - Minimum number of chars of given type in the password
# digit chars
policy_pam_pwquality_dcredit: 0
policy_pam_pwquality_dcredit: -1
# uppercase chars
policy_pam_pwquality_ucredit: 0
# lowercase chars
policy_pam_pwquality_lcredit: 0
policy_pam_pwquality_lcredit: -1
# other chars
policy_pam_pwquality_ocredit: 0
policy_pam_pwquality_ocredit: -1
# PAM -- pam_pwhistory
# Prevent old password re-use
policy_pam_pwhistory: true
policy_pam_pwhistory: false
# How many old passwords to retain
policy_pam_pwhistory_length: 5