Actions
Enhancement #27235
closedDocumentation for passwords should be explicit about password hashes compatibility
Status:
Released
Priority:
1 (highest)
Assignee:
Category:
Documentation
Target version:
Pull Request:
UX impact:
I dislike using that feature
Suggestion strength:
Advise - This would make Rudder significantly better | easier | simpler
User visibility:
First impressions of Rudder
Effort required:
Very Small
Name check:
To do
Fix check:
Checked
Regression:
No
Description
In https://docs.rudder.io/reference/8.3/administration/users.html#_passwords, we don't mention the incoming drop of support for unsafe hash algorithms for passwords (since argon2id in 9.0 with #26996).
The policy is to support bcrypt (8.3, 9.0) and argon2id (9.0), and drop support (#27128) for other ones in 9.0, such as MD5/SHA...
Updated by Clark ANDRIANASOLO 23 days ago
- Related to Architecture #26996: Add argon2id support for local hash added
- Related to Architecture #27128: Drop support for legacy password hash algorithms added
Updated by François ARMAND 21 days ago
- Assignee set to Clark ANDRIANASOLO
- Priority changed from To review to 1 (highest)
It should be very very quick to just do it.
Updated by Clark ANDRIANASOLO 21 days ago
- Status changed from New to In progress
Updated by Clark ANDRIANASOLO 21 days ago
- Status changed from In progress to Pending technical review
- Assignee changed from Clark ANDRIANASOLO to François ARMAND
- Pull Request set to https://github.com/Normation/rudder-doc/pull/1103
Updated by Clark ANDRIANASOLO 21 days ago
- Status changed from Pending technical review to Pending release
Applied in changeset rudder-doc|fa54d59b299d87f566d4ce10823bd752c0d927f6.
Updated by Clark ANDRIANASOLO 20 days ago
- Fix check changed from To do to Checked
Updated by Félix DALLIDET 14 days ago
- Status changed from Pending release to Released
This bug has been fixed in Rudder 8.3.3 which was released today.
Actions