Server security levels
The authentication option you choose is partly determined by the
security level set for the server.
Helix Core Server
superusers can configure server-wide password usage requirements,
password strength enforcement, and supported methods of user/server
authentication by setting the security
configurable.
To set
or change the security
configurable, issue the command:
$ p4 configure set security=securitylevel
where securitylevel
is 0
, 1
,
2
, 3
, 4
, 5
, or 6
Description of each security level
Security level | Server behavior | Note |
---|---|---|
|
The default security level Users with passwords can use either their |
Warning
We strongly recommend that when you create a new user, you assign that user an initial password, and that you make it a strong password. A new user with no password can run p4 passwd unchallenged. For example, This security issue is present even though security levels higher than level |
|
Ensures that all users have passwords. (Users of old Helix Core Server applications can still enter weak passwords.) Users with passwords can use either their |
To enforce a
minimum password length at levels |
|
Ensures that all users have strong passwords. See Password strength requirements. Very old Helix Core Server applications continue to work, but users must change their password to a strong password and upgrade to 2003.2 or later. |
|
|
Requires that all users have strong passwords, and requires the
use of ticket-based ( If you have scripts that rely on passwords, use Setting passwords with the |
|
|
In multi-server and replicated environments, this level ensures that only authenticated service users (subject to all of the restrictions of level 3) can connect to this server. The following checks are also made:
|
Security level 4 and higher implicitly disables the built-in user named |
5
|
Requires that any intermediary (such as a proxy or broker) has a valid authenticated service user. |
|
6
|
Requires each intermediary to have a valid server spec, where the
service user must match the user named in the For example,
if connecting to a proxy on Errors relating to configuration of intermediaries are
logged to the |
Authentication triggers or LDAP
When user authentication occurs through authentication triggers or the native LDAP configuration,
if security
is:
- Unset, or set to
0
,1
, or2
, the server behaves as if the security level is set to 3. - Set to
3
or higher, the server uses that setting.