Skip site navigation (1)Skip section navigation (2)

FreeBSD Manual Pages

  
 
  

home | help
PWQUALITY.CONF(5)	      File Formats Manual	     PWQUALITY.CONF(5)

NAME
       pwquality.conf -	configuration for the libpwquality library

SYNOPSIS
       /etc/security/pwquality.conf

       /etc/security/pwquality.conf.d/*.conf

DESCRIPTION
       pwquality.conf provides a way to	configure the default password quality
       requirements for	the system passwords. This file	is read	by the
       libpwquality library and	utilities that use this	library	for checking
       and generating passwords.

       The file	has a very simple name = value format with possible comments
       starting	with "#" character. The	whitespace at the beginning of line,
       end of line, and	around the "=" sign is ignored.

       The libpwquality	library	also first reads all *.conf files from the
       /etc/security/pwquality.conf.d directory	in ASCII sorted	order. The
       values of the same settings are overridden in the order the files are
       parsed.

OPTIONS
       The possible options in the file	are:

       difok
	   Number of characters	in the new password that must not be present
	   in the old password.	(default 1)

	   The special value of	0 disables all checks of similarity of the new
	   password with the old password except the new password being
	   exactly the same as the old one.

       minlen
	   Minimum acceptable size for the new password	(plus one if credits
	   are not disabled which is the default). (See	pam_pwquality(8).)
	   Cannot be set to lower value	than 6.	(default 8)

       dcredit
	   The maximum credit for having digits	in the new password. If	less
	   than	0 it is	the minimum number of digits in	the new	password.
	   (default 0)

       ucredit
	   The maximum credit for having uppercase characters in the new
	   password.  If less than 0 it	is the minimum number of uppercase
	   characters in the new password. (default 0)

       lcredit
	   The maximum credit for having lowercase characters in the new
	   password.  If less than 0 it	is the minimum number of lowercase
	   characters in the new password. (default 0)

       ocredit
	   The maximum credit for having other characters in the new password.
	   If less than	0 it is	the minimum number of other characters in the
	   new password. (default 0)

       minclass
	   The minimum number of required classes of characters	for the	new
	   password (digits, uppercase,	lowercase, others). (default 0)

       maxrepeat
	   The maximum number of allowed same consecutive characters in	the
	   new password.  The check is disabled	if the value is	0. (default 0)

       maxsequence
	   The maximum length of monotonic character sequences in the new
	   password.  Examples of such sequence	are '12345' or 'fedcb'.	Note
	   that	most such passwords will not pass the simplicity check unless
	   the sequence	is only	a minor	part of	the password.  The check is
	   disabled if the value is 0. (default	0)

       maxclassrepeat
	   The maximum number of allowed consecutive characters	of the same
	   class in the	new password.  The check is disabled if	the value is
	   0. (default 0)

       gecoscheck
	   If nonzero, check whether the words longer than 3 characters	from
	   the GECOS field of the user's passwd(5) entry are contained in the
	   new password.  The check is disabled	if the value is	0. (default 0)

       dictcheck
	   If nonzero, check whether the password (with	possible
	   modifications) matches a word in a dictionary. Currently the
	   dictionary check is performed using the cracklib library. (default
	   1)

       usercheck=N
	   If nonzero, check whether the password (with	possible
	   modifications) contains the user name in some form. It is not
	   performed for user names shorter than 3 characters. (default	1)

       usersubstr=N
	   If greater than 3 (due to the minimum length	in usercheck), check
	   whether the password	contains a substring of	at least N length in
	   some	form.  (default	0)

       enforcing=N
	   If nonzero, reject the password if it fails the checks, otherwise
	   only	print the warning. This	setting	applies	only to	the
	   pam_pwquality module	and possibly other applications	that
	   explicitly change their behavior based on it. It does not affect
	   pwmake(1) and pwscore(1). (default 1)

       badwords
	   Space separated list	of words that must not be contained in the
	   password. These are additional words	to the cracklib	dictionary
	   check. This setting can be also used	by applications	to emulate the
	   gecos check for user	accounts that are not created yet.

       dictpath
	   Path	to the cracklib	dictionaries. Default is to use	the cracklib
	   default.

       retry=N
	   Prompt user at most N times before returning	with error. The
	   default is 1.

       enforce_for_root
	   The module will return error	on failed check	even if	the user
	   changing the	password is root. This option is off by	default	which
	   means that just the message about the failed	check is printed but
	   root	can change the password	anyway.	Note that root is not asked
	   for an old password so the checks that compare the old and new
	   password are	not performed.

       local_users_only
	   The module will not test the	password quality for users that	are
	   not present in the /etc/passwd file.	The module still asks for the
	   password so the following modules in	the stack can use the
	   use_authtok option.	This option is off by default.

SEE ALSO
       pwscore(1), pwmake(1), pam_pwquality(8)

AUTHORS
       Tomas Mraz <tmraz@redhat.com>

Red Hat, Inc.			  2020-08-03		     PWQUALITY.CONF(5)

NAME | SYNOPSIS | DESCRIPTION | OPTIONS | SEE ALSO | AUTHORS

Want to link to this manual page? Use this URL:
<https://man.freebsd.org/cgi/man.cgi?query=pwquality.conf&sektion=5&manpath=FreeBSD+13.0-RELEASE+and+Ports>

home | help