Server security levels
The authentication option you choose is partly determined by the
security level set for the server.
Helix Server
superusers can configure server-wide password usage requirements,
password strength enforcement, and supported methods of user/server
authentication by setting the security
configurable.
To set
or change the security
configurable, issue the command:
$ p4 configure set security=securitylevel
where securitylevel
is 0
, 1
,
2
, 3
, 4
, 5
, or 6
:
Security level | Server behavior |
---|---|
|
The default security level Warning
We strongly recommend that when you create a new user, you assign that user an initial password, and that you make it a strong password. A new user with no password can run p4 passwd unchallenged. For example, This security issue is present even though security levels higher than level Users with passwords can use either their |
|
Ensures that all users have passwords. (Users of old Helix Server applications can still enter weak passwords.) Users with passwords can use either their |
|
Ensures that all users have strong passwords. See Password strength requirements. Very old Helix Server applications continue to work, but users must change their password to a strong password and upgrade to 2003.2 or later. |
|
Requires that all users have strong passwords, and requires the
use of ticket-based ( If you have scripts that rely on passwords, use Setting passwords with the |
|
In multi-server and replicated environments this level ensures that only authenticated service users (subject to all of the restrictions of level 3) can connect to this server. The following checks are also made:
|
5
|
Requires that any intermediary (such as a proxy or broker) has a valid authenticated service user. |
6
|
Requires each intermediary to have a valid server spec, where the
service user must match the user named in the For example,
if connecting to a proxy on Errors relating to configuration of intermediaries are
logged to the |
Use the dm.password.minlength
configurable to enforce a
minimum password length at levels 1
- 3
.
Authentication triggers or LDAP
When user authentication occurs through authentication triggers or the native LDAP configuration,
if security
is:
- unset, or set to
0
,1
, or2
, the server behaves as if the security level is set to 3 - set to
3
or higher, the server uses that setting