Skip to content

Require Configuration or Generation of a Strong, Temporary Initial Administrator Password #4956

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
2 tasks done
renegrob opened this issue May 14, 2025 · 0 comments
Open
2 tasks done
Labels
enhancement New feature or request

Comments

@renegrob
Copy link

Current Behavior

Problem:
The default administrator username and password ("admin"/"admin") for a new Dependency-Track instance are widely known. This presents a critical security vulnerability immediately after deployment, leaving new systems exposed until the password is manually changed.

Context:
Mandating the configuration or generation of a strong, temporary initial password is crucial for the security of new Dependency-Track deployments. This eliminates the immediate and significant risk associated with the well-known default credentials and ensures that all new instances start with a more secure footing, while still enforcing a password change upon first login.

Proposed Behavior

Solution:
Implement a mandatory mechanism to avoid the use of default credentials. This could be achieved by requiring one of the following:

  1. Configuration-based Initial Password: Administrators must define a strong, temporary initial administrator password via configuration (e.g., an environment variable) prior to the first startup.
  2. Automatic Password Generation: If no initial password is provided via configuration, the application should automatically generate a strong, temporary initial password upon the first startup and log it securely.

In either case, the system should require the administrator to change this temporary password upon their first login.

Alternatives Considered:
The current approach relies on administrators manually updating the default password post-deployment, which leaves a significant window of vulnerability.

Checklist

@renegrob renegrob added the enhancement New feature or request label May 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy