Skip to content

Commit 0958e06

Browse files
feat: new Samba AD password attributes
Added documentation of: - Password never expires - Required password change Fixed release notes for 8.6.
1 parent 839eca3 commit 0958e06

File tree

2 files changed

+22
-3
lines changed

2 files changed

+22
-3
lines changed

release_notes.rst

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,11 @@ Major changes on 2025-09-30
2525
:ref:`password-policy-section` for details. The previous default policy
2626
for Samba AD was between 1 and 42 days.
2727

28+
- **Samba AD password attributes** -- For internal AD domains, two new
29+
attributes can be controlled from the cluster-admin and user portal web
30+
interfaces: ``Required password change`` and ``Password never expires``.
31+
See :ref:`user_groups-section`.
32+
2833
- **New TLS certificates page** -- The :ref:`TLS certificates
2934
<certificate_manager-section>` UI page has completed its enhancement
3035
cycle started in previous releases, providing full management of Let's

user_domains.rst

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -241,8 +241,8 @@ Password age
241241

242242
You can toggle password age policy by clicking on the ``Password age`` switch. If enabled, you can configure the following parameters:
243243

244-
* ``Minimum password age``: the minimum number of days that must pass before a new password change.
245-
* ``Maximum password age``: password expiration time in days. After this period, the password is no longer valid for logins and must be changed. Users can change their expired password with :ref:`user-management-portal-section`.
244+
* ``Minimum password age`` (default 0): the minimum number of days that must pass before a new password change.
245+
* ``Maximum password age`` (default 180: password expiration time in days. After this period, the password is no longer valid for logins and must be changed. Users can change their expired password with :ref:`user-management-portal-section`.
246246

247247
Password strength
248248
-----------------
@@ -357,7 +357,19 @@ When creating a user, the following fields are mandatory:
357357
* User name
358358
* Full name (name and surname)
359359
* Password
360-
* Email address (optional field)
360+
361+
Optional attributes are:
362+
363+
* Email address -- Corresponds to the standard LDAP ``mail`` attribute. It
364+
can be set to the user's personal email address, where password
365+
expiration warnings are sent. Some applications may also use it as a
366+
valid login name.
367+
* Password never expires (AD only) -- When enabled, the user's password
368+
remains valid indefinitely, bypassing the domain password age policy.
369+
* Required password change / User has to change password at next login (AD
370+
only) -- When enabled, the user is prompted to change their password at
371+
the next login.
372+
361373

362374
A user can be added to one or more groups.
363375

@@ -395,6 +407,8 @@ When creating a user, the following fields are available:
395407
* Password
396408
* Group (optional field)
397409
* Email address (optional field)
410+
* Password never expires (optional field, AD only)
411+
* Required password change / User has to change password at next login (optional field, AD only)
398412

399413
The portal is automatically configured on every instance of :ref:`active_directory-section` or :ref:`openldap-section` provider.
400414

0 commit comments

Comments
 (0)