Skip to content

Commit

Permalink
Merge pull request #31 from jupyterhub/add-password-strength-option
Browse files Browse the repository at this point in the history
Add password strength option
  • Loading branch information
yuvipanda authored Jan 23, 2019
2 parents 9ffb9e2 + a959691 commit 449e08d
Show file tree
Hide file tree
Showing 8 changed files with 10,097 additions and 59 deletions.
1 change: 1 addition & 0 deletions docs/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ Indices and tables
:caption: Contents:

quickstart
options


Installation
Expand Down
12 changes: 7 additions & 5 deletions docs/options.rst
Original file line number Diff line number Diff line change
Expand Up @@ -4,17 +4,19 @@ Feature Options
Password Strength
----------------

By default, when a user signs up through Native Authenticator there is no password strength verification. If you need this, you can add a verification for password strength by adding the following parameter to your config file:
By default, when a user signs up through Native Authenticator there is no password strength verification. There are two methods that you can add to increase password strength: a verification for commmon passowords and a minimum length of password.

To verify if the password is not common (such as 'qwerty' or '1234'), you can add the following line to your config file:

.. code-block:: python
c.Authenticator.check_password_strength = True
c.Authenticator.check_common_password = True
The Authenticator will verify if the password has at least 8 characters and if it not a common password. The list of the common passwords it checks is available `on this link <https://github.com/danielmiessler/SecLists/blob/master/Passwords/Common-Credentials/10-million-password-list-top-10000.txt>`_ >._
The Authenticator will verify if the password is a common password and the user won't be able to sign up if it is. The list of the common passwords that are in our verification is available `on this link <https://github.com/danielmiessler/SecLists/blob/master/Passwords/Common-Credentials/10-million-password-list-top-10000.txt>`_ >._


By default the Authenticator will verify if the password is at least 8 characters long. If you, however, need something different, you can change the minimum size adding this parameter to the config file:
You can also add a minimum password length that the user must have. To do this add the following line on the config file with an integer as a value:

.. code-block:: python
c.Authenticator.password_length = 10
c.Authenticator.minimim_password_length = 10
Loading

0 comments on commit 449e08d

Please sign in to comment.