mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 08:15:52 +03:00
[GH-ISSUE #1381] [FEATURE REQUEST] pwdLastSet attribute #479
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#479
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @MrSpock on GitHub (Jan 12, 2026).
Original GitHub issue: https://github.com/lldap/lldap/issues/1381
Motivation
There are number of applications that requires pwdLastSet i.e Stalwart mail server requires that ldap will return attribute when last time password was changed (https://stalw.art/docs/auth/backend/ldap/#object-attributes_
Both OpenLDAP and Microsoft AD have this attribute.
Describe the solution you'd like
Add pwdLastSet with type DateTime that contain date & time when last time password was changed and is returned when requested in attribute list
@nitnelave commented on GitHub (Jan 12, 2026):
That sounds like it could be easily handled by a plugin. I'd like to wait for the plugin API to be there instead.
Is this blocking you for an integration? I thought that stalwart was already working with LLDAP?
@MrSpock commented on GitHub (Jan 12, 2026):
Stalwart rewrote its LDAP plugin to integrate more closely with OAuth and now according to docs (https://stalw.art/docs/auth/backend/ldap/#object-attributes) you need either:
Workaround for this is to map secret-change -> createtimestamp attribute, but this is "hacky" way and prevents token expiry when password is changed which is some security risk.
@nitnelave commented on GitHub (Jan 12, 2026):
The latest version of LLDAP should have a "last modified" (or something like that) attribute (modify timestamp?)
While obviously not perfect, that should fix your immediate issue, no?