mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 00:05:50 +03:00
[GH-ISSUE #239] [BUG] No validation on frontend #83
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#83
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Leopere on GitHub (Jul 12, 2022).
Original GitHub issue: https://github.com/lldap/lldap/issues/239
It would appear that the users name field is able to accept input with spaces and non alpha numeric characters. It seems that when I did this the system seemed to lock up and slow down significantly.
@nitnelave commented on GitHub (Jul 12, 2022):
There's fundamentally no limitation regarding what format usernames take, they're just case insensitive. The problem might be with downstream applications who will not recognize the string as a valid username.
I doubt that it affects performance though, we don't do anything smart with the username apart from lowercasing it.
One other thing to consider is that it's the admins who create users and thus choose the usernames, so I'm counting on them to be a bit reasonable ;)
I might forbid spaces though, just in case.
@olaxe commented on GitHub (Jul 18, 2022):
I use emails as User ID because it is much more easy for my users to remember it. Is it possible to keep also authorized all email characters?
@nitnelave commented on GitHub (Jul 18, 2022):
Note that you can configure most services to allow logging in via both email and username, in the LDAP settings
@olaxe commented on GitHub (Jul 19, 2022):
Yes thanks. Unfortunately, not the LLDAP reset password process. My users are good at reset their passwords.