Not really a direct answer, but it is way too long to be comment.
In the end, your question will boil down to: who is responsable for the security of a user password? And you fall in a quasi religious war... Many system admins think (know?) that most user do not care at all about the security of their password and they do their best to invent rules to improve that security (minimal length, forced or forbidden patters, maximum lifetime, minimal differences between consecutive passwords, etc.) And some other security actors think of that like a bandage on a wooden leg. Because it leads to users forgetting their passwords and secure password recovery is hard. And because in the end users just write down the password on a paper (post-it) sticked on the screen. So for those other people the only way to obtain security is to educate users so that they are aware of the risk involved by poor security practices, including poor passwords. Additionaly, they say that most of the rules actually (slightly) lower entropy which is bad, and tend to let the system process the plain text password longer which is also bad, specially is it leads to keeping plain text copies of previous passwords.
So if you tend to believe that the admin is the one that knows about security and that trusting users is stupid, then you should avoid any solution that let the end users choose their password without control. If you think that the users should be responsable for their own security and all that you can do is informing them of best and poor practices, then SPR is for you.
Apart from religion, I must aknowledge that some objective things can matter, mainly who the users are (corporate users, users interested in IT or security, or just anybody), and what is the sensitiveness of the application and its data...