Weak passwords can be easily cracked by attackers using brute force or dictionary attacks. This would cause the PEM files to be decrypted, making the passwords ineffective.
This PR creates a password policy that enforces a minimum length (more than 8 characters, see NIST guidelines).
Description
Weak passwords can be easily cracked by attackers using brute force or dictionary attacks. This would cause the PEM files to be decrypted, making the passwords ineffective.
This PR creates a password policy that enforces a minimum length (more than 8 characters, see NIST guidelines).
Fixes FOLLOW-1579
How Has This Been Tested?
Check of new identities covered by new e2e Manually tested that pre-existing identities keep working, even if the password is too short
Checklist: