Skip to content

Commit ec231cd

Browse files
committed
Add new username check mode of password patterns to docs
1 parent f8c4159 commit ec231cd

File tree

3 files changed

+11
-0
lines changed

3 files changed

+11
-0
lines changed

en/identity-server/6.1.0/docs/apis/identity-governance-rest-api.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ and properties of connectors as mentioned below. <br>
2626
| Minimum number of characters | passwordPolicy.min.length | This denotes the minimum number of characters in the password. |
2727
| Maximum number of characters | passwordPolicy.max.length | This denotes the maximum number of characters in the password. |
2828
| Password pattern regex | passwordPolicy.pattern | The regular expression pattern to validate the password. |
29+
| Username check mode | passwordPolicy.username.check.mode | Check if password contains or equals to username. |
2930
| Error message on pattern violation | passwordPolicy.errorMsg | The error message that will be displayed when a pattern violation is detected in the password. |
3031

3132
??? "User Onboarding"

en/identity-server/6.1.0/docs/guides/password-mgt/password-policies.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,13 +61,22 @@ WSO2 Identity Server (IS) allows you to define custom password policies and enfo
6161
</div></td>
6262
</tr>
6363
<tr class="even">
64+
<td>Username check mode</td>
65+
<td>Check if password contains or equals to username.</td>
66+
<td>-</td>
67+
</tr>
68+
<tr class="odd">
6469
<td>Error message on pattern violation</td>
6570
<td>This value specifies the error message that will appear if the password policy is violated at the point of user creation.</td>
6671
<td>'Password pattern policy violated. Password should contain a digit[0-9], a lower case letter[a-z], an upper case letter[A-Z], one of !@#$%&amp;* characters'</td>
6772
</tr>
6873
</tbody>
6974
</table>
7075

76+
!!! abstract ""
77+
78+
This feature is available for WSO2 IS 6.1.0 from update level 250 onwards (Updates 2.0 model). If you don't already have this update, see the instructions on [updating WSO2 products](https://updates.docs.wso2.com/en/latest/updates/overview/).
79+
7180
!!! warning "Ask Password and JIT Provisioning"
7281

7382
When registering users with [Password Entry (ask password)]({{base_path}}/guides/identity-lifecycles/invitation-workflow/) or [JIT Provisioning]({{base_path}}/get-started/provisioning-architecture/#jit-provisioning), temporary passwords are automatically generated and validated against a predefined PasswordJavaRegEx regular expression in the user store configurations. For complex regex patterns, the password validation could fail causing an unsuccessful user registration.

en/identity-server/next/docs/apis/governance-connectors.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ This is the RESTful API for managing identity governance configurations in WSO2
1919
| Minimum number of characters | passwordPolicy.min.length | This denotes the minimum number of characters in the password. |
2020
| Maximum number of characters | passwordPolicy.max.length | This denotes the maximum number of characters in the password. |
2121
| Password pattern regex | passwordPolicy.pattern | The regular expression pattern to validate the password. |
22+
| Username check mode | passwordPolicy.username.check.mode | Check if password contains or equals to username. |
2223
| Error message on pattern violation | passwordPolicy.errorMsg | The error message that will be displayed when a pattern violation is detected in the password. |
2324

2425
??? "User Onboarding"

0 commit comments

Comments
 (0)