mirror of
https://github.com/advplyr/audiobookshelf.git
synced 2026-03-02 22:46:56 -05:00
[Enhancement]: Password Policy #997
Labels
No labels
authentication
awaiting release
backlog
bug
chapter editor
config-issue
ebooks
encoding/embedding
enhancement
help wanted
listening sessions & progress
planned
possible plugin
progress sync
sorting/filtering/searching
unable to reproduce
upload
users & permissions
waiting
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/audiobookshelf#997
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @theniwo on GitHub (Feb 25, 2023).
We need administrative settings to control the strenth of a password.
Currently users can set their password to anything unsafe.
These requirements should be enableable
@DieselTech commented on GitHub (Feb 25, 2023):
I would love to see the adoption of the NIST's new password guidelines as a starting point:
The length thing is what will trip up most people. It should be at least 8 but that's it. Enforcing long password "just because" has shown to have the opposite effect. It makes people create gibberish password that aren't actually secure just to get to the limit. Also making them include different characters like A-Z, a-z, 0-9 isn't safe. It just leads to insecure passwords.
The only one I would see us not using is the last part about comparing them with online breech databases. For a self-hosted app that likely won't happen as those services tend to cost money.
@daVinci2793 commented on GitHub (Jun 12, 2023):
It adds some complexity, but a solid compromise between forcing healthy password policies and good security is customizable password policies. A password policy page under settings that allows the admins/root to change the policy would be ideal. That way, users that are hosting but not proxying/forwarding/sharing need not worry.
Additionally, if we copy nextcloud's homework and use their "password database" validator it could be a meaningful addition. The HIBP pwnedpasswords API they are using is free.
@daVinci2793 commented on GitHub (Jun 12, 2023):
https://haveibeenpwned.com/Passwords
It's actually pretty awesome, and if you dev tools the request, it's very simple.
@skyzuma commented on GitHub (Jun 30, 2023):
any progressions?
@nichwall commented on GitHub (Dec 9, 2023):
Could this be handled by using OIDC for SSO (or other authentication methods if added) instead of requiring ABS to enforce password policies?
https://github.com/advplyr/audiobookshelf/issues/998
@Sapd commented on GitHub (Jan 25, 2024):
@nichwall
Yes every Identity Provider should be able to configure that properly, some even have very advanced features as mentioned above (like comparing with haveibeenpwned etc.). I think complexity wise it only makes sense that ABS has simple rules (like min. amount of characters), and for more advanced use cases people should configure OIDC and disable local auth.
@kulps commented on GitHub (Aug 17, 2025):
I hope there's a way to enable MFA at the very least, though adopting NIST's guidelines as DieselTech suggested is also great.
@Vito0912 commented on GitHub (Aug 18, 2025):
MFA/2FA currently is not planned to be added. See https://github.com/advplyr/audiobookshelf/issues/4480
You can do this via OIDC though
@kulps commented on GitHub (Aug 18, 2025):
Thanks for confirming. It's too bad, but I appreciate knowing.