Server security levels
The authentication option you choose is partly determined by the
security level set for the server.
P4 Server
superusers can configure server-wide password usage requirements,
password strength enforcement, and supported methods of user/server
authentication by setting the security
configurable.
To set
or change the security
configurable, issue the command:
p4 configure set security=securitylevel
where securitylevel
is 0
, 1
,
2
, 3
, 4
, 5
, or 6
Server security level 4 or higher is recommended.
Each level includes the restrictions of lower levels and adds further restrictions.
Security level | Server behavior | Note |
---|---|---|
|
The default security level Users with passwords can use either their |
|
|
Ensures that all users have passwords. (Users of old P4 Server applications can still enter weak passwords.) Users with passwords can use either their |
To enforce a
minimum password length at levels We strongly recommend that when you create a new user, you assign that user an initial password, and that you make it a strong password.
|
|
Ensures that all users have strong passwords. See Password strength requirements. Very old P4 Server applications continue to work, but users must change their password to a strong password and upgrade to 2003.2 or later. |
|
|
Requires that all users have strong passwords, and requires the
use of ticket-based ( If you have scripts that rely on passwords, use p4 passwd -O oldpass-P newpass or by setting It is prohibited to set passwords with the |
|
|
In multi-server and replicated environments, this level ensures that only authenticated service users can connect to this server, and all replicas need server specs. The following checks are also made:
|
Security level 4 and higher implicitly disables the built-in user named Unless your P4 Server is a standalone server, set the security level to 4 or higher, which protects multi-server and replicated environments.
To learn more, see Secure the server.
|
5
|
Requires that any intermediary has a valid authenticated service user. Intermediaries include, but are not limited to, P4 Broker, P4 Proxy, P4 Code Review, and P4 DAM. |
|
6
|
Requires each intermediary to have a valid server spec, where the
service user must match the user named in the For example,
if connecting to a proxy on If structured logging is enabled, errors relating to configuration of intermediaries are
logged to the |
Authentication triggers or LDAP
When user authentication occurs through authentication triggers or the native LDAP configuration,
if security
is:
- Unset, or set to
0
,1
, or2
, the server behaves as if the security level is set to 3. - Set to
3
or higher, the server uses that setting.