This repository was archived by the owner on Sep 10, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 32
More intelligent password strength #172
Labels
A-Local-Password
Related to the local password database
T-Enhancement
New feature of request
Z-Product-Input
Requires input from the product team
Comments
There is some password strength enforcement via the OPA policy + config (require uppercase/lowercase/number + min length), although we might be better off using something more intelligent like zxcvbn? This one would definitely require interactive feedback on the frontend, else you'd get cryptic error messages like "your password is not strong enough" without knowing exactly what "strong enough" means |
Here is the final component in Figma, and here is a reference in the designs. |
This was referenced Jul 9, 2024
After #2972, here's what will be left:
|
This was referenced Jul 18, 2024
This was referenced Sep 9, 2024
For your information, this issue has been copied over to the Element fork of |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
A-Local-Password
Related to the local password database
T-Enhancement
New feature of request
Z-Product-Input
Requires input from the product team
Uh oh!
There was an error while loading. Please reload this page.
There is a basic password policy in place, which can set a minimum password length, require uppercase, lowercase and/or numeric symbols.
This is very basic and lacks direct feedback to the user.
We should instead use a real password strength estimation like zxcvbn and enforce it.
This would also need live feedback to the user whether their password is strong enough or not.
Open questions:
Relevant design screens:
The text was updated successfully, but these errors were encountered: