Provider created APS application which provides some kind of service to users. During service user creating a password has to be set up for the user.
Provider wants to configure rules to validate password being configured for a service user of an APS application, e.g. to deny too short and/or simple passwords.
There are several ways to implement user password verification in APS application.
1. The APS application setting which corresponds to user password should be declared in the APP-META.xml using proper data type - string or password, like in the example below:
<setting id="newUserPassword" type="string" min-length="1" max-length="12" default-value="" regex="">
The min-length and max-length attributes allow to define minimal and maximum length of user password correspondingly, the regex attribute allows to define regular expression which APS controller will use to validate entered value.
Refer to the APS Package Format Specification > Data Types for more details about data types in APS applications.
2. Provider may create verification script that will check if entered password satisfies desired rules. APS application verification script is being called on every step in APS application configuration wizard in POA Customer Control Panel.
Refer to the APS Package Format Specification > Verification script for more details about verification scripts in APS applications.
3. The APS application setting which corresponds to user password may be declared in the APP-META.xml using class "password", like in the example below:
<setting id="newUserPassword" type="password" class="password">
In this case password of APS application user will be inherited from corresponding service user and Provider may apply restriction rules on user passwords in POA using the built-in Password Quality Level feature. In this case POA will not allow to set up too short and/or simple password on system level.
Refer to POA Provider Guide > Setting Password Policies for Customer for more details about Password Quality Level feature.