Understanding LDAP vs shadow password policies